Dec 13 14:30:52.111751 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:30:52.111797 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:30:52.111815 kernel: BIOS-provided physical RAM map: Dec 13 14:30:52.111829 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Dec 13 14:30:52.111842 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Dec 13 14:30:52.119368 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Dec 13 14:30:52.119397 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Dec 13 14:30:52.119412 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Dec 13 14:30:52.119426 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd276fff] usable Dec 13 14:30:52.119441 kernel: BIOS-e820: [mem 0x00000000bd277000-0x00000000bd280fff] ACPI data Dec 13 14:30:52.119455 kernel: BIOS-e820: [mem 0x00000000bd281000-0x00000000bf8ecfff] usable Dec 13 14:30:52.119469 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Dec 13 14:30:52.119484 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Dec 13 14:30:52.119498 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Dec 13 14:30:52.119519 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Dec 13 14:30:52.119534 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Dec 13 14:30:52.119549 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Dec 13 14:30:52.119564 kernel: NX (Execute Disable) protection: active Dec 13 14:30:52.119580 kernel: efi: EFI v2.70 by EDK II Dec 13 14:30:52.119596 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd277018 Dec 13 14:30:52.119610 kernel: random: crng init done Dec 13 14:30:52.119626 kernel: SMBIOS 2.4 present. Dec 13 14:30:52.119668 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Dec 13 14:30:52.119683 kernel: Hypervisor detected: KVM Dec 13 14:30:52.119698 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:30:52.119713 kernel: kvm-clock: cpu 0, msr 1ab19a001, primary cpu clock Dec 13 14:30:52.119728 kernel: kvm-clock: using sched offset of 13059490256 cycles Dec 13 14:30:52.119745 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:30:52.119761 kernel: tsc: Detected 2299.998 MHz processor Dec 13 14:30:52.119776 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:30:52.119793 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:30:52.119809 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Dec 13 14:30:52.119828 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:30:52.119865 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Dec 13 14:30:52.119887 kernel: Using GB pages for direct mapping Dec 13 14:30:52.119901 kernel: Secure boot disabled Dec 13 14:30:52.119914 kernel: ACPI: Early table checksum verification disabled Dec 13 14:30:52.119928 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Dec 13 14:30:52.119943 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Dec 13 14:30:52.119959 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Dec 13 14:30:52.119986 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Dec 13 14:30:52.120002 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Dec 13 14:30:52.120019 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20240322) Dec 13 14:30:52.120036 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Dec 13 14:30:52.120053 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Dec 13 14:30:52.120070 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Dec 13 14:30:52.120090 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Dec 13 14:30:52.120107 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Dec 13 14:30:52.120124 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Dec 13 14:30:52.120140 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Dec 13 14:30:52.120155 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Dec 13 14:30:52.120172 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Dec 13 14:30:52.120188 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Dec 13 14:30:52.120204 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Dec 13 14:30:52.120221 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Dec 13 14:30:52.120241 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Dec 13 14:30:52.120258 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Dec 13 14:30:52.120274 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:30:52.120291 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 14:30:52.120308 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 14:30:52.120324 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Dec 13 14:30:52.120341 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Dec 13 14:30:52.120359 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Dec 13 14:30:52.120376 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Dec 13 14:30:52.120396 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Dec 13 14:30:52.120413 kernel: Zone ranges: Dec 13 14:30:52.120430 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:30:52.120447 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 14:30:52.120463 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Dec 13 14:30:52.120480 kernel: Movable zone start for each node Dec 13 14:30:52.120496 kernel: Early memory node ranges Dec 13 14:30:52.120513 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Dec 13 14:30:52.120531 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Dec 13 14:30:52.120550 kernel: node 0: [mem 0x0000000000100000-0x00000000bd276fff] Dec 13 14:30:52.120567 kernel: node 0: [mem 0x00000000bd281000-0x00000000bf8ecfff] Dec 13 14:30:52.120583 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Dec 13 14:30:52.120600 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Dec 13 14:30:52.120616 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Dec 13 14:30:52.120633 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:30:52.120658 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Dec 13 14:30:52.120675 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Dec 13 14:30:52.120691 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges Dec 13 14:30:52.120711 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Dec 13 14:30:52.120728 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Dec 13 14:30:52.120744 kernel: ACPI: PM-Timer IO Port: 0xb008 Dec 13 14:30:52.120762 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:30:52.120778 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:30:52.120795 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:30:52.120812 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:30:52.120828 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:30:52.124516 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:30:52.124560 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:30:52.124576 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:30:52.124593 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Dec 13 14:30:52.124608 kernel: Booting paravirtualized kernel on KVM Dec 13 14:30:52.124655 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:30:52.124672 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:30:52.124687 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:30:52.124703 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:30:52.124719 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:30:52.124739 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:30:52.124755 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:30:52.124771 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 Dec 13 14:30:52.124788 kernel: Policy zone: Normal Dec 13 14:30:52.124807 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:30:52.124821 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:30:52.124836 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 14:30:52.126430 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:30:52.126460 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:30:52.126485 kernel: Memory: 7515408K/7860544K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 344876K reserved, 0K cma-reserved) Dec 13 14:30:52.126502 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:30:52.126519 kernel: Kernel/User page tables isolation: enabled Dec 13 14:30:52.126535 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:30:52.126551 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:30:52.126567 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:30:52.126585 kernel: rcu: RCU event tracing is enabled. Dec 13 14:30:52.126601 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:30:52.126622 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:30:52.126663 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:30:52.126680 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:30:52.126701 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:30:52.126718 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 14:30:52.126735 kernel: Console: colour dummy device 80x25 Dec 13 14:30:52.126752 kernel: printk: console [ttyS0] enabled Dec 13 14:30:52.126769 kernel: ACPI: Core revision 20210730 Dec 13 14:30:52.126786 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:30:52.126803 kernel: x2apic enabled Dec 13 14:30:52.126825 kernel: Switched APIC routing to physical x2apic. Dec 13 14:30:52.126841 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Dec 13 14:30:52.126874 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 14:30:52.126892 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Dec 13 14:30:52.126908 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Dec 13 14:30:52.126925 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Dec 13 14:30:52.126942 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:30:52.126963 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 14:30:52.126980 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 14:30:52.126998 kernel: Spectre V2 : Mitigation: IBRS Dec 13 14:30:52.127015 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:30:52.127033 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:30:52.127050 kernel: RETBleed: Mitigation: IBRS Dec 13 14:30:52.127066 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:30:52.127083 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Dec 13 14:30:52.127099 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:30:52.127118 kernel: MDS: Mitigation: Clear CPU buffers Dec 13 14:30:52.127134 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:30:52.127150 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:30:52.127167 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:30:52.127183 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:30:52.127199 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:30:52.127215 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 14:30:52.127231 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:30:52.127248 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:30:52.127268 kernel: LSM: Security Framework initializing Dec 13 14:30:52.127284 kernel: SELinux: Initializing. Dec 13 14:30:52.127301 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:30:52.127317 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:30:52.127334 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Dec 13 14:30:52.127351 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Dec 13 14:30:52.127367 kernel: signal: max sigframe size: 1776 Dec 13 14:30:52.127381 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:30:52.127396 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:30:52.127416 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:30:52.127433 kernel: x86: Booting SMP configuration: Dec 13 14:30:52.127449 kernel: .... node #0, CPUs: #1 Dec 13 14:30:52.127467 kernel: kvm-clock: cpu 1, msr 1ab19a041, secondary cpu clock Dec 13 14:30:52.127488 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Dec 13 14:30:52.127507 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 14:30:52.127525 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:30:52.127544 kernel: smpboot: Max logical packages: 1 Dec 13 14:30:52.127567 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Dec 13 14:30:52.127585 kernel: devtmpfs: initialized Dec 13 14:30:52.127603 kernel: x86/mm: Memory block size: 128MB Dec 13 14:30:52.127622 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Dec 13 14:30:52.127652 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:30:52.127670 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:30:52.127688 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:30:52.127707 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:30:52.127726 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:30:52.127750 kernel: audit: type=2000 audit(1734100250.472:1): state=initialized audit_enabled=0 res=1 Dec 13 14:30:52.127768 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:30:52.127786 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:30:52.127805 kernel: cpuidle: using governor menu Dec 13 14:30:52.127823 kernel: ACPI: bus type PCI registered Dec 13 14:30:52.127841 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:30:52.127876 kernel: dca service started, version 1.12.1 Dec 13 14:30:52.127892 kernel: PCI: Using configuration type 1 for base access Dec 13 14:30:52.127910 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:30:52.127932 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:30:52.127949 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:30:52.127966 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:30:52.127984 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:30:52.128001 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:30:52.128019 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:30:52.128036 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:30:52.128054 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:30:52.128072 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:30:52.128093 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Dec 13 14:30:52.128111 kernel: ACPI: Interpreter enabled Dec 13 14:30:52.128128 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 14:30:52.128145 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:30:52.128161 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:30:52.128177 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Dec 13 14:30:52.128194 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:30:52.128465 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:30:52.128635 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 14:30:52.128668 kernel: PCI host bridge to bus 0000:00 Dec 13 14:30:52.128831 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:30:52.138105 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:30:52.138268 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:30:52.138417 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Dec 13 14:30:52.138561 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:30:52.138765 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 14:30:52.138968 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Dec 13 14:30:52.139145 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 13 14:30:52.139313 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Dec 13 14:30:52.139486 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Dec 13 14:30:52.139663 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Dec 13 14:30:52.139838 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Dec 13 14:30:52.148151 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 14:30:52.148336 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Dec 13 14:30:52.148525 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Dec 13 14:30:52.148713 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:30:52.150087 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Dec 13 14:30:52.150292 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Dec 13 14:30:52.150325 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:30:52.150344 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:30:52.150363 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:30:52.150381 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:30:52.150399 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 14:30:52.150416 kernel: iommu: Default domain type: Translated Dec 13 14:30:52.150434 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:30:52.150452 kernel: vgaarb: loaded Dec 13 14:30:52.150470 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:30:52.150492 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:30:52.150509 kernel: PTP clock support registered Dec 13 14:30:52.150526 kernel: Registered efivars operations Dec 13 14:30:52.150544 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:30:52.150562 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:30:52.150579 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Dec 13 14:30:52.150596 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Dec 13 14:30:52.150614 kernel: e820: reserve RAM buffer [mem 0xbd277000-0xbfffffff] Dec 13 14:30:52.150631 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Dec 13 14:30:52.150649 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Dec 13 14:30:52.150665 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:30:52.150683 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:30:52.150701 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:30:52.150719 kernel: pnp: PnP ACPI init Dec 13 14:30:52.150736 kernel: pnp: PnP ACPI: found 7 devices Dec 13 14:30:52.150754 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:30:52.150771 kernel: NET: Registered PF_INET protocol family Dec 13 14:30:52.150789 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:30:52.150810 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 14:30:52.150828 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:30:52.150865 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:30:52.150883 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 14:30:52.150908 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 14:30:52.150925 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:30:52.150943 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:30:52.150960 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:30:52.150982 kernel: NET: Registered PF_XDP protocol family Dec 13 14:30:52.151142 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:30:52.151292 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:30:52.151437 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:30:52.151583 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Dec 13 14:30:52.151754 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:30:52.151778 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:30:52.151801 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 14:30:52.151819 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) Dec 13 14:30:52.151837 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:30:52.151876 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Dec 13 14:30:52.151901 kernel: clocksource: Switched to clocksource tsc Dec 13 14:30:52.151919 kernel: Initialise system trusted keyrings Dec 13 14:30:52.151936 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 14:30:52.151954 kernel: Key type asymmetric registered Dec 13 14:30:52.151971 kernel: Asymmetric key parser 'x509' registered Dec 13 14:30:52.151993 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:30:52.152010 kernel: io scheduler mq-deadline registered Dec 13 14:30:52.152028 kernel: io scheduler kyber registered Dec 13 14:30:52.152046 kernel: io scheduler bfq registered Dec 13 14:30:52.152064 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:30:52.152082 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 13 14:30:52.152254 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Dec 13 14:30:52.152277 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Dec 13 14:30:52.152445 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Dec 13 14:30:52.152473 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 13 14:30:52.152632 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Dec 13 14:30:52.152653 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:30:52.152670 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:30:52.152688 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 14:30:52.152705 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Dec 13 14:30:52.152722 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Dec 13 14:30:52.152926 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Dec 13 14:30:52.152955 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:30:52.152969 kernel: i8042: Warning: Keylock active Dec 13 14:30:52.152984 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:30:52.152999 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:30:52.153169 kernel: rtc_cmos 00:00: RTC can wake from S4 Dec 13 14:30:52.153327 kernel: rtc_cmos 00:00: registered as rtc0 Dec 13 14:30:52.153473 kernel: rtc_cmos 00:00: setting system clock to 2024-12-13T14:30:51 UTC (1734100251) Dec 13 14:30:52.153616 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Dec 13 14:30:52.153642 kernel: intel_pstate: CPU model not supported Dec 13 14:30:52.153659 kernel: pstore: Registered efi as persistent store backend Dec 13 14:30:52.153676 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:30:52.153693 kernel: Segment Routing with IPv6 Dec 13 14:30:52.153709 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:30:52.153725 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:30:52.153740 kernel: Key type dns_resolver registered Dec 13 14:30:52.153757 kernel: IPI shorthand broadcast: enabled Dec 13 14:30:52.153773 kernel: sched_clock: Marking stable (762409674, 175953903)->(975818193, -37454616) Dec 13 14:30:52.153792 kernel: registered taskstats version 1 Dec 13 14:30:52.153809 kernel: Loading compiled-in X.509 certificates Dec 13 14:30:52.153825 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:30:52.153866 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:30:52.153883 kernel: Key type .fscrypt registered Dec 13 14:30:52.153906 kernel: Key type fscrypt-provisioning registered Dec 13 14:30:52.153923 kernel: pstore: Using crash dump compression: deflate Dec 13 14:30:52.153940 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:30:52.153957 kernel: ima: No architecture policies found Dec 13 14:30:52.153978 kernel: clk: Disabling unused clocks Dec 13 14:30:52.153995 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:30:52.154011 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:30:52.154028 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:30:52.154045 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:30:52.154061 kernel: Run /init as init process Dec 13 14:30:52.154078 kernel: with arguments: Dec 13 14:30:52.154095 kernel: /init Dec 13 14:30:52.154111 kernel: with environment: Dec 13 14:30:52.154130 kernel: HOME=/ Dec 13 14:30:52.154147 kernel: TERM=linux Dec 13 14:30:52.154165 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:30:52.154186 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:30:52.154206 systemd[1]: Detected virtualization kvm. Dec 13 14:30:52.154224 systemd[1]: Detected architecture x86-64. Dec 13 14:30:52.154241 systemd[1]: Running in initrd. Dec 13 14:30:52.154262 systemd[1]: No hostname configured, using default hostname. Dec 13 14:30:52.154280 systemd[1]: Hostname set to . Dec 13 14:30:52.154297 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:30:52.154314 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:30:52.154331 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:30:52.154349 systemd[1]: Reached target cryptsetup.target. Dec 13 14:30:52.154367 systemd[1]: Reached target paths.target. Dec 13 14:30:52.154384 systemd[1]: Reached target slices.target. Dec 13 14:30:52.154405 systemd[1]: Reached target swap.target. Dec 13 14:30:52.154423 systemd[1]: Reached target timers.target. Dec 13 14:30:52.154442 systemd[1]: Listening on iscsid.socket. Dec 13 14:30:52.154460 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:30:52.154477 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:30:52.154495 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:30:52.154513 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:30:52.154530 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:30:52.154552 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:30:52.154569 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:30:52.154606 systemd[1]: Reached target sockets.target. Dec 13 14:30:52.154628 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:30:52.154646 systemd[1]: Finished network-cleanup.service. Dec 13 14:30:52.154663 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:30:52.154682 systemd[1]: Starting systemd-journald.service... Dec 13 14:30:52.154703 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:30:52.154720 systemd[1]: Starting systemd-resolved.service... Dec 13 14:30:52.154738 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:30:52.154756 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:30:52.154775 kernel: audit: type=1130 audit(1734100252.127:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.154793 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:30:52.154811 kernel: audit: type=1130 audit(1734100252.138:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.154830 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:30:52.154885 kernel: audit: type=1130 audit(1734100252.151:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.154915 systemd-journald[189]: Journal started Dec 13 14:30:52.155004 systemd-journald[189]: Runtime Journal (/run/log/journal/2e27fbd72a2cb45b9c9aa03591eea264) is 8.0M, max 148.8M, 140.8M free. Dec 13 14:30:52.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.136036 systemd-modules-load[190]: Inserted module 'overlay' Dec 13 14:30:52.162988 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:30:52.167048 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:30:52.167115 systemd[1]: Started systemd-journald.service. Dec 13 14:30:52.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.181866 kernel: audit: type=1130 audit(1734100252.176:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.192239 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:30:52.197904 kernel: audit: type=1130 audit(1734100252.190:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.197698 systemd-resolved[191]: Positive Trust Anchors: Dec 13 14:30:52.197712 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:30:52.197773 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:30:52.209232 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:30:52.221010 kernel: audit: type=1130 audit(1734100252.212:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.209580 systemd-resolved[191]: Defaulting to hostname 'linux'. Dec 13 14:30:52.214342 systemd[1]: Started systemd-resolved.service. Dec 13 14:30:52.233123 systemd[1]: Reached target nss-lookup.target. Dec 13 14:30:52.248584 kernel: audit: type=1130 audit(1734100252.231:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.248639 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:30:52.248665 kernel: Bridge firewalling registered Dec 13 14:30:52.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.243533 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:30:52.248142 systemd-modules-load[190]: Inserted module 'br_netfilter' Dec 13 14:30:52.262657 dracut-cmdline[206]: dracut-dracut-053 Dec 13 14:30:52.267075 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:30:52.283873 kernel: SCSI subsystem initialized Dec 13 14:30:52.302778 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:30:52.302869 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:30:52.304870 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:30:52.309603 systemd-modules-load[190]: Inserted module 'dm_multipath' Dec 13 14:30:52.310782 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:30:52.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.324349 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:30:52.330580 kernel: audit: type=1130 audit(1734100252.321:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.341572 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:30:52.352056 kernel: audit: type=1130 audit(1734100252.343:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.367877 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:30:52.388887 kernel: iscsi: registered transport (tcp) Dec 13 14:30:52.416361 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:30:52.416445 kernel: QLogic iSCSI HBA Driver Dec 13 14:30:52.461255 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:30:52.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.462982 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:30:52.521905 kernel: raid6: avx2x4 gen() 18373 MB/s Dec 13 14:30:52.538887 kernel: raid6: avx2x4 xor() 8018 MB/s Dec 13 14:30:52.555928 kernel: raid6: avx2x2 gen() 18019 MB/s Dec 13 14:30:52.572886 kernel: raid6: avx2x2 xor() 18577 MB/s Dec 13 14:30:52.589889 kernel: raid6: avx2x1 gen() 13907 MB/s Dec 13 14:30:52.606883 kernel: raid6: avx2x1 xor() 16179 MB/s Dec 13 14:30:52.623884 kernel: raid6: sse2x4 gen() 11093 MB/s Dec 13 14:30:52.640884 kernel: raid6: sse2x4 xor() 6634 MB/s Dec 13 14:30:52.657888 kernel: raid6: sse2x2 gen() 12024 MB/s Dec 13 14:30:52.674891 kernel: raid6: sse2x2 xor() 7402 MB/s Dec 13 14:30:52.691887 kernel: raid6: sse2x1 gen() 10508 MB/s Dec 13 14:30:52.709305 kernel: raid6: sse2x1 xor() 5176 MB/s Dec 13 14:30:52.709339 kernel: raid6: using algorithm avx2x4 gen() 18373 MB/s Dec 13 14:30:52.709362 kernel: raid6: .... xor() 8018 MB/s, rmw enabled Dec 13 14:30:52.710010 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:30:52.724888 kernel: xor: automatically using best checksumming function avx Dec 13 14:30:52.829890 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:30:52.841785 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:30:52.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.840000 audit: BPF prog-id=7 op=LOAD Dec 13 14:30:52.841000 audit: BPF prog-id=8 op=LOAD Dec 13 14:30:52.843520 systemd[1]: Starting systemd-udevd.service... Dec 13 14:30:52.860760 systemd-udevd[389]: Using default interface naming scheme 'v252'. Dec 13 14:30:52.867882 systemd[1]: Started systemd-udevd.service. Dec 13 14:30:52.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.870860 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:30:52.895808 dracut-pre-trigger[396]: rd.md=0: removing MD RAID activation Dec 13 14:30:52.936251 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:30:52.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:52.937520 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:30:53.005371 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:30:53.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:53.087898 kernel: scsi host0: Virtio SCSI HBA Dec 13 14:30:53.096877 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:30:53.110872 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Dec 13 14:30:53.173288 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:30:53.173368 kernel: AES CTR mode by8 optimization enabled Dec 13 14:30:53.237930 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Dec 13 14:30:53.297717 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Dec 13 14:30:53.297971 kernel: sd 0:0:1:0: [sda] Write Protect is off Dec 13 14:30:53.298198 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Dec 13 14:30:53.298401 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 14:30:53.298613 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:30:53.298646 kernel: GPT:17805311 != 25165823 Dec 13 14:30:53.298669 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:30:53.298691 kernel: GPT:17805311 != 25165823 Dec 13 14:30:53.298712 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:30:53.298734 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:30:53.298756 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Dec 13 14:30:53.370239 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:30:53.383186 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (452) Dec 13 14:30:53.397753 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:30:53.416273 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:30:53.427039 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:30:53.453102 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:30:53.467247 systemd[1]: Starting disk-uuid.service... Dec 13 14:30:53.492179 disk-uuid[520]: Primary Header is updated. Dec 13 14:30:53.492179 disk-uuid[520]: Secondary Entries is updated. Dec 13 14:30:53.492179 disk-uuid[520]: Secondary Header is updated. Dec 13 14:30:53.519012 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:30:53.530878 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:30:53.562898 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:30:54.548881 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:30:54.549294 disk-uuid[521]: The operation has completed successfully. Dec 13 14:30:54.620388 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:30:54.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:54.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:54.620542 systemd[1]: Finished disk-uuid.service. Dec 13 14:30:54.631321 systemd[1]: Starting verity-setup.service... Dec 13 14:30:54.667004 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:30:54.746972 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:30:54.748747 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:30:54.775539 systemd[1]: Finished verity-setup.service. Dec 13 14:30:54.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:54.850913 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:30:54.850970 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:30:54.851363 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:30:54.852363 systemd[1]: Starting ignition-setup.service... Dec 13 14:30:54.914160 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:30:54.914210 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:30:54.914233 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:30:54.914255 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:30:54.907213 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:30:54.925381 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:30:54.940214 systemd[1]: Finished ignition-setup.service. Dec 13 14:30:54.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:54.941581 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:30:55.025783 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:30:55.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:55.034000 audit: BPF prog-id=9 op=LOAD Dec 13 14:30:55.036782 systemd[1]: Starting systemd-networkd.service... Dec 13 14:30:55.071798 systemd-networkd[695]: lo: Link UP Dec 13 14:30:55.071811 systemd-networkd[695]: lo: Gained carrier Dec 13 14:30:55.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:55.072682 systemd-networkd[695]: Enumeration completed Dec 13 14:30:55.072868 systemd[1]: Started systemd-networkd.service. Dec 13 14:30:55.073670 systemd-networkd[695]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:30:55.078068 systemd-networkd[695]: eth0: Link UP Dec 13 14:30:55.078078 systemd-networkd[695]: eth0: Gained carrier Dec 13 14:30:55.088204 systemd[1]: Reached target network.target. Dec 13 14:30:55.088974 systemd-networkd[695]: eth0: DHCPv4 address 10.128.0.60/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 14:30:55.105303 systemd[1]: Starting iscsiuio.service... Dec 13 14:30:55.178134 systemd[1]: Started iscsiuio.service. Dec 13 14:30:55.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:55.179648 systemd[1]: Starting iscsid.service... Dec 13 14:30:55.205155 iscsid[705]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:30:55.205155 iscsid[705]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:30:55.205155 iscsid[705]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:30:55.205155 iscsid[705]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:30:55.205155 iscsid[705]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:30:55.205155 iscsid[705]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:30:55.205155 iscsid[705]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:30:55.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:55.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:55.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:55.198196 systemd[1]: Started iscsid.service. Dec 13 14:30:55.242804 ignition[607]: Ignition 2.14.0 Dec 13 14:30:55.213318 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:30:55.242819 ignition[607]: Stage: fetch-offline Dec 13 14:30:55.232433 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:30:55.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:55.242931 ignition[607]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:30:55.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:55.288431 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:30:55.242976 ignition[607]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:30:55.305280 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:30:55.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:55.260978 ignition[607]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:30:55.323037 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:30:55.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:55.261184 ignition[607]: parsed url from cmdline: "" Dec 13 14:30:55.323189 systemd[1]: Reached target remote-fs.target. Dec 13 14:30:55.261189 ignition[607]: no config URL provided Dec 13 14:30:55.351202 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:30:55.261196 ignition[607]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:30:55.376276 systemd[1]: Starting ignition-fetch.service... Dec 13 14:30:55.261207 ignition[607]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:30:55.397509 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:30:55.261216 ignition[607]: failed to fetch config: resource requires networking Dec 13 14:30:55.406308 unknown[720]: fetched base config from "system" Dec 13 14:30:55.261380 ignition[607]: Ignition finished successfully Dec 13 14:30:55.406328 unknown[720]: fetched base config from "system" Dec 13 14:30:55.387593 ignition[720]: Ignition 2.14.0 Dec 13 14:30:55.406335 unknown[720]: fetched user config from "gcp" Dec 13 14:30:55.387601 ignition[720]: Stage: fetch Dec 13 14:30:55.412466 systemd[1]: Finished ignition-fetch.service. Dec 13 14:30:55.387752 ignition[720]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:30:55.428593 systemd[1]: Starting ignition-kargs.service... Dec 13 14:30:55.387779 ignition[720]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:30:55.452474 systemd[1]: Finished ignition-kargs.service. Dec 13 14:30:55.395903 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:30:55.462463 systemd[1]: Starting ignition-disks.service... Dec 13 14:30:55.396110 ignition[720]: parsed url from cmdline: "" Dec 13 14:30:55.485484 systemd[1]: Finished ignition-disks.service. Dec 13 14:30:55.396116 ignition[720]: no config URL provided Dec 13 14:30:55.495313 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:30:55.396124 ignition[720]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:30:55.511022 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:30:55.396135 ignition[720]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:30:55.511138 systemd[1]: Reached target local-fs.target. Dec 13 14:30:55.396174 ignition[720]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Dec 13 14:30:55.534066 systemd[1]: Reached target sysinit.target. Dec 13 14:30:55.402750 ignition[720]: GET result: OK Dec 13 14:30:55.547067 systemd[1]: Reached target basic.target. Dec 13 14:30:55.402825 ignition[720]: parsing config with SHA512: 00b0042352fc990880c4dd9bfa650b5cf1f4b5605e3127e76f2e17dc3650d5baa429f84c856f09a2e3d8d4de065a16d9e424ea8ea05f45b95aa9e34a6145eff7 Dec 13 14:30:55.561303 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:30:55.406804 ignition[720]: fetch: fetch complete Dec 13 14:30:55.406811 ignition[720]: fetch: fetch passed Dec 13 14:30:55.407012 ignition[720]: Ignition finished successfully Dec 13 14:30:55.443344 ignition[726]: Ignition 2.14.0 Dec 13 14:30:55.443354 ignition[726]: Stage: kargs Dec 13 14:30:55.443493 ignition[726]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:30:55.443519 ignition[726]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:30:55.450244 ignition[726]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:30:55.451415 ignition[726]: kargs: kargs passed Dec 13 14:30:55.451469 ignition[726]: Ignition finished successfully Dec 13 14:30:55.474858 ignition[732]: Ignition 2.14.0 Dec 13 14:30:55.474874 ignition[732]: Stage: disks Dec 13 14:30:55.475019 ignition[732]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:30:55.475050 ignition[732]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:30:55.482946 ignition[732]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:30:55.484465 ignition[732]: disks: disks passed Dec 13 14:30:55.484522 ignition[732]: Ignition finished successfully Dec 13 14:30:55.602447 systemd-fsck[740]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 14:30:55.830838 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:30:55.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:55.840261 systemd[1]: Mounting sysroot.mount... Dec 13 14:30:55.871156 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:30:55.868995 systemd[1]: Mounted sysroot.mount. Dec 13 14:30:55.878269 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:30:55.896404 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:30:55.901679 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:30:55.901730 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:30:55.901763 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:30:55.997136 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (746) Dec 13 14:30:55.997186 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:30:55.997211 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:30:55.997234 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:30:55.921406 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:30:55.946033 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:30:56.019018 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:30:56.019058 initrd-setup-root[767]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:30:55.989589 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:30:56.038031 initrd-setup-root[777]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:30:56.048023 initrd-setup-root[785]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:30:56.065972 initrd-setup-root[793]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:30:56.057955 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:30:56.102298 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:30:56.144043 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:30:56.144092 kernel: audit: type=1130 audit(1734100256.109:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:56.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:56.118128 systemd[1]: Starting ignition-mount.service... Dec 13 14:30:56.152372 systemd[1]: Starting sysroot-boot.service... Dec 13 14:30:56.173278 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:30:56.173752 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:30:56.193829 systemd[1]: Finished sysroot-boot.service. Dec 13 14:30:56.201052 ignition[812]: INFO : Ignition 2.14.0 Dec 13 14:30:56.201052 ignition[812]: INFO : Stage: mount Dec 13 14:30:56.201052 ignition[812]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:30:56.201052 ignition[812]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:30:56.201052 ignition[812]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:30:56.361020 kernel: audit: type=1130 audit(1734100256.207:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:56.361075 kernel: audit: type=1130 audit(1734100256.234:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:56.361101 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (821) Dec 13 14:30:56.361123 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:30:56.361146 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:30:56.361168 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:30:56.361190 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:30:56.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:56.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:56.361407 ignition[812]: INFO : mount: mount passed Dec 13 14:30:56.361407 ignition[812]: INFO : Ignition finished successfully Dec 13 14:30:56.209421 systemd[1]: Finished ignition-mount.service. Dec 13 14:30:56.237659 systemd[1]: Starting ignition-files.service... Dec 13 14:30:56.272942 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:30:56.411032 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (843) Dec 13 14:30:56.411077 ignition[840]: INFO : Ignition 2.14.0 Dec 13 14:30:56.411077 ignition[840]: INFO : Stage: files Dec 13 14:30:56.411077 ignition[840]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:30:56.411077 ignition[840]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:30:56.411077 ignition[840]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:30:56.411077 ignition[840]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:30:56.411077 ignition[840]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:30:56.411077 ignition[840]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:30:56.411077 ignition[840]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:30:56.411077 ignition[840]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:30:56.411077 ignition[840]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:30:56.411077 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Dec 13 14:30:56.411077 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:30:56.411077 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3907433912" Dec 13 14:30:56.411077 ignition[840]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3907433912": device or resource busy Dec 13 14:30:56.411077 ignition[840]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3907433912", trying btrfs: device or resource busy Dec 13 14:30:56.411077 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3907433912" Dec 13 14:30:56.411077 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3907433912" Dec 13 14:30:56.411077 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem3907433912" Dec 13 14:30:56.336296 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:30:56.684066 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem3907433912" Dec 13 14:30:56.684066 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Dec 13 14:30:56.684066 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 14:30:56.684066 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(7): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:30:56.684066 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3199976044" Dec 13 14:30:56.684066 ignition[840]: CRITICAL : files: createFilesystemsFiles: createFiles: op(7): op(8): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3199976044": device or resource busy Dec 13 14:30:56.684066 ignition[840]: ERROR : files: createFilesystemsFiles: createFiles: op(7): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3199976044", trying btrfs: device or resource busy Dec 13 14:30:56.684066 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3199976044" Dec 13 14:30:56.684066 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(9): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3199976044" Dec 13 14:30:56.684066 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [started] unmounting "/mnt/oem3199976044" Dec 13 14:30:56.684066 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(7): op(a): [finished] unmounting "/mnt/oem3199976044" Dec 13 14:30:56.684066 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Dec 13 14:30:56.684066 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:30:56.684066 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:30:56.684066 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:30:56.385798 unknown[840]: wrote ssh authorized keys file for user: core Dec 13 14:30:56.936043 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:30:56.936043 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:30:56.936043 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:30:56.936043 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 14:30:56.936043 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:30:56.936043 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1045991748" Dec 13 14:30:56.936043 ignition[840]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1045991748": device or resource busy Dec 13 14:30:56.936043 ignition[840]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1045991748", trying btrfs: device or resource busy Dec 13 14:30:56.936043 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1045991748" Dec 13 14:30:56.936043 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1045991748" Dec 13 14:30:56.936043 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem1045991748" Dec 13 14:30:56.936043 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem1045991748" Dec 13 14:30:56.936043 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Dec 13 14:30:56.936043 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 14:30:56.721022 systemd-networkd[695]: eth0: Gained IPv6LL Dec 13 14:30:57.195014 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:30:57.195014 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2745242690" Dec 13 14:30:57.195014 ignition[840]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2745242690": device or resource busy Dec 13 14:30:57.195014 ignition[840]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2745242690", trying btrfs: device or resource busy Dec 13 14:30:57.195014 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2745242690" Dec 13 14:30:57.195014 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2745242690" Dec 13 14:30:57.195014 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem2745242690" Dec 13 14:30:57.195014 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem2745242690" Dec 13 14:30:57.195014 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Dec 13 14:30:57.195014 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:30:57.195014 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 14:30:57.195014 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(16): GET result: OK Dec 13 14:30:57.581053 kernel: audit: type=1130 audit(1734100257.277:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.581104 kernel: audit: type=1130 audit(1734100257.368:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.581131 kernel: audit: type=1130 audit(1734100257.405:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.581152 kernel: audit: type=1131 audit(1734100257.405:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.581190 kernel: audit: type=1130 audit(1734100257.520:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.581205 kernel: audit: type=1131 audit(1734100257.520:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.581448 ignition[840]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:30:57.581448 ignition[840]: INFO : files: op(17): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:30:57.581448 ignition[840]: INFO : files: op(17): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:30:57.581448 ignition[840]: INFO : files: op(18): [started] processing unit "oem-gce.service" Dec 13 14:30:57.581448 ignition[840]: INFO : files: op(18): [finished] processing unit "oem-gce.service" Dec 13 14:30:57.581448 ignition[840]: INFO : files: op(19): [started] processing unit "oem-gce-enable-oslogin.service" Dec 13 14:30:57.581448 ignition[840]: INFO : files: op(19): [finished] processing unit "oem-gce-enable-oslogin.service" Dec 13 14:30:57.581448 ignition[840]: INFO : files: op(1a): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:30:57.581448 ignition[840]: INFO : files: op(1a): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:30:57.581448 ignition[840]: INFO : files: op(1b): [started] setting preset to enabled for "oem-gce.service" Dec 13 14:30:57.581448 ignition[840]: INFO : files: op(1b): [finished] setting preset to enabled for "oem-gce.service" Dec 13 14:30:57.581448 ignition[840]: INFO : files: op(1c): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 14:30:57.581448 ignition[840]: INFO : files: op(1c): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Dec 13 14:30:57.581448 ignition[840]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:30:57.581448 ignition[840]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:30:57.581448 ignition[840]: INFO : files: files passed Dec 13 14:30:57.581448 ignition[840]: INFO : Ignition finished successfully Dec 13 14:30:57.891189 kernel: audit: type=1130 audit(1734100257.652:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.253934 systemd[1]: Finished ignition-files.service. Dec 13 14:30:57.288786 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:30:57.931079 initrd-setup-root-after-ignition[863]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:30:57.316241 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:30:57.317400 systemd[1]: Starting ignition-quench.service... Dec 13 14:30:57.340609 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:30:57.370548 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:30:57.370699 systemd[1]: Finished ignition-quench.service. Dec 13 14:30:57.407457 systemd[1]: Reached target ignition-complete.target. Dec 13 14:30:58.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.472340 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:30:57.517546 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:30:58.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.517672 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:30:58.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.522428 systemd[1]: Reached target initrd-fs.target. Dec 13 14:30:58.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.590171 systemd[1]: Reached target initrd.target. Dec 13 14:30:58.128041 ignition[878]: INFO : Ignition 2.14.0 Dec 13 14:30:58.128041 ignition[878]: INFO : Stage: umount Dec 13 14:30:58.128041 ignition[878]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:30:58.128041 ignition[878]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Dec 13 14:30:57.608349 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:30:58.202223 ignition[878]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Dec 13 14:30:58.202223 ignition[878]: INFO : umount: umount passed Dec 13 14:30:58.202223 ignition[878]: INFO : Ignition finished successfully Dec 13 14:30:58.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:58.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:58.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.609714 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:30:58.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.633367 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:30:58.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.655610 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:30:58.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.700586 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:30:58.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.711315 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:30:58.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.724460 systemd[1]: Stopped target timers.target. Dec 13 14:30:57.762350 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:30:58.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.762555 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:30:57.794534 systemd[1]: Stopped target initrd.target. Dec 13 14:30:57.827359 systemd[1]: Stopped target basic.target. Dec 13 14:30:57.862353 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:30:57.877389 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:30:57.906352 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:30:58.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.921303 systemd[1]: Stopped target remote-fs.target. Dec 13 14:30:58.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:57.940378 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:30:57.962360 systemd[1]: Stopped target sysinit.target. Dec 13 14:30:57.988318 systemd[1]: Stopped target local-fs.target. Dec 13 14:30:58.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:58.003291 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:30:58.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:58.019298 systemd[1]: Stopped target swap.target. Dec 13 14:30:58.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:58.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:58.523000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:30:58.034227 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:30:58.034441 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:30:58.049421 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:30:58.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:58.065253 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:30:58.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:58.065459 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:30:58.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:58.081456 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:30:58.081653 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:30:58.099436 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:30:58.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:58.099625 systemd[1]: Stopped ignition-files.service. Dec 13 14:30:58.115897 systemd[1]: Stopping ignition-mount.service... Dec 13 14:30:58.149338 systemd[1]: Stopping iscsiuio.service... Dec 13 14:30:58.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:58.161629 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:30:58.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:58.191054 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:30:58.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:58.191370 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:30:58.210314 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:30:58.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:58.210505 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:30:58.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:58.232959 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:30:58.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:58.234177 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:30:58.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:58.234294 systemd[1]: Stopped iscsiuio.service. Dec 13 14:30:58.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:58.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:58.236802 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:30:58.236931 systemd[1]: Stopped ignition-mount.service. Dec 13 14:30:58.258752 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:30:58.258883 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:30:58.273936 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:30:58.274097 systemd[1]: Stopped ignition-disks.service. Dec 13 14:30:58.896072 systemd-journald[189]: Received SIGTERM from PID 1 (n/a). Dec 13 14:30:58.896144 iscsid[705]: iscsid shutting down. Dec 13 14:30:58.289219 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:30:58.289304 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:30:58.304216 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:30:58.304287 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:30:58.319141 systemd[1]: Stopped target network.target. Dec 13 14:30:58.333045 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:30:58.333166 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:30:58.348177 systemd[1]: Stopped target paths.target. Dec 13 14:30:58.348235 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:30:58.351953 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:30:58.362285 systemd[1]: Stopped target slices.target. Dec 13 14:30:58.376249 systemd[1]: Stopped target sockets.target. Dec 13 14:30:58.389311 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:30:58.389357 systemd[1]: Closed iscsid.socket. Dec 13 14:30:58.402288 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:30:58.402346 systemd[1]: Closed iscsiuio.socket. Dec 13 14:30:58.415322 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:30:58.415395 systemd[1]: Stopped ignition-setup.service. Dec 13 14:30:58.428324 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:30:58.428397 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:30:58.450477 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:30:58.453949 systemd-networkd[695]: eth0: DHCPv6 lease lost Dec 13 14:30:58.465385 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:30:58.474713 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:30:58.474837 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:30:58.495815 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:30:58.495987 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:30:58.510829 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:30:58.510981 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:30:58.526309 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:30:58.526357 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:30:58.542225 systemd[1]: Stopping network-cleanup.service... Dec 13 14:30:58.556017 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:30:58.556149 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:30:58.571199 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:30:58.571275 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:30:58.586300 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:30:58.586378 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:30:58.602353 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:30:58.619920 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:30:58.620614 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:30:58.620769 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:30:58.644072 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:30:58.644153 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:30:58.658144 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:30:58.658211 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:30:58.673103 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:30:58.673203 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:30:58.689200 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:30:58.689282 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:30:58.704193 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:30:58.704269 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:30:58.720246 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:30:58.736998 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:30:58.737239 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:30:58.753361 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:30:58.753430 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:30:58.771275 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:30:58.771362 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:30:58.787636 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:30:58.788330 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:30:58.788446 systemd[1]: Stopped network-cleanup.service. Dec 13 14:30:58.802516 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:30:58.802627 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:30:58.819356 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:30:58.835358 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:30:58.858282 systemd[1]: Switching root. Dec 13 14:30:58.906214 systemd-journald[189]: Journal stopped Dec 13 14:31:03.556924 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:31:03.557026 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:31:03.557062 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:31:03.557086 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:31:03.557109 kernel: SELinux: policy capability open_perms=1 Dec 13 14:31:03.557132 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:31:03.557167 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:31:03.557192 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:31:03.557214 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:31:03.557241 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:31:03.557264 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:31:03.557289 systemd[1]: Successfully loaded SELinux policy in 110.808ms. Dec 13 14:31:03.557334 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.959ms. Dec 13 14:31:03.557360 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:31:03.557389 systemd[1]: Detected virtualization kvm. Dec 13 14:31:03.557413 systemd[1]: Detected architecture x86-64. Dec 13 14:31:03.557436 systemd[1]: Detected first boot. Dec 13 14:31:03.557460 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:31:03.557484 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:31:03.557507 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:31:03.557532 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:31:03.557563 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:31:03.557593 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:31:03.557633 kernel: kauditd_printk_skb: 51 callbacks suppressed Dec 13 14:31:03.557656 kernel: audit: type=1334 audit(1734100262.651:88): prog-id=12 op=LOAD Dec 13 14:31:03.557684 kernel: audit: type=1334 audit(1734100262.651:89): prog-id=3 op=UNLOAD Dec 13 14:31:03.557707 kernel: audit: type=1334 audit(1734100262.656:90): prog-id=13 op=LOAD Dec 13 14:31:03.557729 kernel: audit: type=1334 audit(1734100262.663:91): prog-id=14 op=LOAD Dec 13 14:31:03.557753 kernel: audit: type=1334 audit(1734100262.663:92): prog-id=4 op=UNLOAD Dec 13 14:31:03.557778 kernel: audit: type=1334 audit(1734100262.663:93): prog-id=5 op=UNLOAD Dec 13 14:31:03.557800 kernel: audit: type=1334 audit(1734100262.670:94): prog-id=15 op=LOAD Dec 13 14:31:03.557823 kernel: audit: type=1334 audit(1734100262.670:95): prog-id=12 op=UNLOAD Dec 13 14:31:03.557859 kernel: audit: type=1334 audit(1734100262.677:96): prog-id=16 op=LOAD Dec 13 14:31:03.557883 kernel: audit: type=1334 audit(1734100262.712:97): prog-id=17 op=LOAD Dec 13 14:31:03.557905 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:31:03.557930 systemd[1]: Stopped iscsid.service. Dec 13 14:31:03.557954 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:31:03.557978 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:31:03.558007 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:31:03.558031 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:31:03.558055 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:31:03.558079 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:31:03.558101 systemd[1]: Created slice system-getty.slice. Dec 13 14:31:03.558124 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:31:03.558148 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:31:03.558172 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:31:03.558199 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:31:03.558223 systemd[1]: Created slice user.slice. Dec 13 14:31:03.558247 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:31:03.558272 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:31:03.558296 systemd[1]: Set up automount boot.automount. Dec 13 14:31:03.558327 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:31:03.558351 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:31:03.558375 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:31:03.558398 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:31:03.558424 systemd[1]: Reached target integritysetup.target. Dec 13 14:31:03.558448 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:31:03.558471 systemd[1]: Reached target remote-fs.target. Dec 13 14:31:03.558495 systemd[1]: Reached target slices.target. Dec 13 14:31:03.558518 systemd[1]: Reached target swap.target. Dec 13 14:31:03.558541 systemd[1]: Reached target torcx.target. Dec 13 14:31:03.558563 systemd[1]: Reached target veritysetup.target. Dec 13 14:31:03.558585 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:31:03.558606 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:31:03.558639 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:31:03.558922 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:31:03.558965 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:31:03.558995 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:31:03.559017 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:31:03.559043 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:31:03.559067 systemd[1]: Mounting media.mount... Dec 13 14:31:03.559089 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:03.559112 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:31:03.559136 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:31:03.559163 systemd[1]: Mounting tmp.mount... Dec 13 14:31:03.559191 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:31:03.559213 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:31:03.559237 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:31:03.559258 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:31:03.559282 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:31:03.559304 systemd[1]: Starting modprobe@drm.service... Dec 13 14:31:03.559328 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:31:03.559351 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:31:03.559385 systemd[1]: Starting modprobe@loop.service... Dec 13 14:31:03.559411 kernel: fuse: init (API version 7.34) Dec 13 14:31:03.559451 kernel: loop: module loaded Dec 13 14:31:03.559474 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:31:03.559497 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:31:03.559522 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:31:03.559544 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:31:03.559574 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:31:03.559605 systemd[1]: Stopped systemd-journald.service. Dec 13 14:31:03.559640 systemd[1]: Starting systemd-journald.service... Dec 13 14:31:03.559761 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:31:03.559796 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:31:03.559826 systemd-journald[1002]: Journal started Dec 13 14:31:03.560063 systemd-journald[1002]: Runtime Journal (/run/log/journal/2e27fbd72a2cb45b9c9aa03591eea264) is 8.0M, max 148.8M, 140.8M free. Dec 13 14:30:58.905000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:30:59.202000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:30:59.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:30:59.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:30:59.351000 audit: BPF prog-id=10 op=LOAD Dec 13 14:30:59.351000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:30:59.351000 audit: BPF prog-id=11 op=LOAD Dec 13 14:30:59.351000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:30:59.508000 audit[911]: AVC avc: denied { associate } for pid=911 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:30:59.508000 audit[911]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:59.508000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:30:59.519000 audit[911]: AVC avc: denied { associate } for pid=911 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:30:59.519000 audit[911]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:30:59.519000 audit: CWD cwd="/" Dec 13 14:30:59.519000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:59.519000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:30:59.519000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:31:02.651000 audit: BPF prog-id=12 op=LOAD Dec 13 14:31:02.651000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:31:02.656000 audit: BPF prog-id=13 op=LOAD Dec 13 14:31:02.663000 audit: BPF prog-id=14 op=LOAD Dec 13 14:31:02.663000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:31:02.663000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:31:02.670000 audit: BPF prog-id=15 op=LOAD Dec 13 14:31:02.670000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:31:02.677000 audit: BPF prog-id=16 op=LOAD Dec 13 14:31:02.712000 audit: BPF prog-id=17 op=LOAD Dec 13 14:31:02.712000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:31:02.712000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:31:02.719000 audit: BPF prog-id=18 op=LOAD Dec 13 14:31:02.719000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:31:02.726000 audit: BPF prog-id=19 op=LOAD Dec 13 14:31:02.726000 audit: BPF prog-id=20 op=LOAD Dec 13 14:31:02.726000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:31:02.726000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:31:02.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:02.740000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:31:02.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:02.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:02.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.514000 audit: BPF prog-id=21 op=LOAD Dec 13 14:31:03.514000 audit: BPF prog-id=22 op=LOAD Dec 13 14:31:03.514000 audit: BPF prog-id=23 op=LOAD Dec 13 14:31:03.514000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:31:03.514000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:31:03.552000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:31:03.552000 audit[1002]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7fff38295bb0 a2=4000 a3=7fff38295c4c items=0 ppid=1 pid=1002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:03.552000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:30:59.505427 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:30:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:31:02.651331 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:30:59.506679 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:30:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:31:02.729613 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:30:59.506716 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:30:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:30:59.506768 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:30:59Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:30:59.506789 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:30:59Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:30:59.506872 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:30:59Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:30:59.506899 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:30:59Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:30:59.507220 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:30:59Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:30:59.507297 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:30:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:30:59.507324 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:30:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:30:59.508674 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:30:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:30:59.508740 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:30:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:30:59.508777 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:30:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:30:59.508804 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:30:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:30:59.508835 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:30:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:30:59.508881 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:30:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:31:02.029010 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:31:02Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:31:02.029321 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:31:02Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:31:02.029469 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:31:02Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:31:02.029704 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:31:02Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:31:02.029763 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:31:02Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:31:03.577912 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:31:02.029834 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:31:02Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:31:03.591920 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:31:03.605883 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:31:03.611896 systemd[1]: Stopped verity-setup.service. Dec 13 14:31:03.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.630884 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:03.639916 systemd[1]: Started systemd-journald.service. Dec 13 14:31:03.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.649503 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:31:03.657249 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:31:03.665202 systemd[1]: Mounted media.mount. Dec 13 14:31:03.672232 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:31:03.681239 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:31:03.691169 systemd[1]: Mounted tmp.mount. Dec 13 14:31:03.698292 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:31:03.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.707473 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:31:03.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.716412 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:31:03.716645 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:31:03.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.725456 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:31:03.725688 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:31:03.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.735497 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:31:03.735736 systemd[1]: Finished modprobe@drm.service. Dec 13 14:31:03.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.744461 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:31:03.744683 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:31:03.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.753428 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:31:03.753669 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:31:03.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.762413 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:31:03.762639 systemd[1]: Finished modprobe@loop.service. Dec 13 14:31:03.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.771493 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:31:03.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.780444 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:31:03.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.789428 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:31:03.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.798471 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:31:03.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.807880 systemd[1]: Reached target network-pre.target. Dec 13 14:31:03.817601 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:31:03.827466 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:31:03.835011 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:31:03.838903 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:31:03.847807 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:31:03.860506 systemd-journald[1002]: Time spent on flushing to /var/log/journal/2e27fbd72a2cb45b9c9aa03591eea264 is 63.736ms for 1145 entries. Dec 13 14:31:03.860506 systemd-journald[1002]: System Journal (/var/log/journal/2e27fbd72a2cb45b9c9aa03591eea264) is 8.0M, max 584.8M, 576.8M free. Dec 13 14:31:03.974200 systemd-journald[1002]: Received client request to flush runtime journal. Dec 13 14:31:03.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:03.856504 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:31:03.859235 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:31:03.874070 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:31:03.875960 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:31:03.884969 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:31:03.976764 udevadm[1016]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:31:03.894094 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:31:03.904390 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:31:03.913264 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:31:03.922370 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:31:03.931538 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:31:03.943634 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:31:03.959242 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:31:03.969907 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:31:03.981554 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:31:03.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:04.029287 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:31:04.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:04.607611 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:31:04.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:04.615000 audit: BPF prog-id=24 op=LOAD Dec 13 14:31:04.615000 audit: BPF prog-id=25 op=LOAD Dec 13 14:31:04.615000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:31:04.615000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:31:04.618003 systemd[1]: Starting systemd-udevd.service... Dec 13 14:31:04.641626 systemd-udevd[1021]: Using default interface naming scheme 'v252'. Dec 13 14:31:04.689565 systemd[1]: Started systemd-udevd.service. Dec 13 14:31:04.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:04.698000 audit: BPF prog-id=26 op=LOAD Dec 13 14:31:04.701476 systemd[1]: Starting systemd-networkd.service... Dec 13 14:31:04.713000 audit: BPF prog-id=27 op=LOAD Dec 13 14:31:04.713000 audit: BPF prog-id=28 op=LOAD Dec 13 14:31:04.714000 audit: BPF prog-id=29 op=LOAD Dec 13 14:31:04.717001 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:31:04.777411 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:31:04.794701 systemd[1]: Started systemd-userdbd.service. Dec 13 14:31:04.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:04.887480 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:31:04.938278 systemd-networkd[1035]: lo: Link UP Dec 13 14:31:04.938294 systemd-networkd[1035]: lo: Gained carrier Dec 13 14:31:04.939162 systemd-networkd[1035]: Enumeration completed Dec 13 14:31:04.939304 systemd[1]: Started systemd-networkd.service. Dec 13 14:31:04.939351 systemd-networkd[1035]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:31:04.941482 systemd-networkd[1035]: eth0: Link UP Dec 13 14:31:04.941508 systemd-networkd[1035]: eth0: Gained carrier Dec 13 14:31:04.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:04.952571 systemd-networkd[1035]: eth0: DHCPv4 address 10.128.0.60/32, gateway 10.128.0.1 acquired from 169.254.169.254 Dec 13 14:31:04.967881 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1030) Dec 13 14:31:04.984000 audit[1024]: AVC avc: denied { confidentiality } for pid=1024 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:31:04.984000 audit[1024]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555fb1a93b10 a1=337fc a2=7fd163a43bc5 a3=5 items=110 ppid=1021 pid=1024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:04.984000 audit: CWD cwd="/" Dec 13 14:31:04.984000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=1 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=2 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=3 name=(null) inode=13765 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=4 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=5 name=(null) inode=13766 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=6 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=7 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=8 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=9 name=(null) inode=13768 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=10 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=11 name=(null) inode=13769 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=12 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=13 name=(null) inode=13770 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=14 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=15 name=(null) inode=13771 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=16 name=(null) inode=13767 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=17 name=(null) inode=13772 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=18 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=19 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=20 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=21 name=(null) inode=13774 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=22 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=23 name=(null) inode=13775 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=24 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=25 name=(null) inode=13776 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=26 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=27 name=(null) inode=13777 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=28 name=(null) inode=13773 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=29 name=(null) inode=13778 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=30 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=31 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=32 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=33 name=(null) inode=13780 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=34 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=35 name=(null) inode=13781 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=36 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=37 name=(null) inode=13782 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=38 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=39 name=(null) inode=13783 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=40 name=(null) inode=13779 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=41 name=(null) inode=13784 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=42 name=(null) inode=13764 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=43 name=(null) inode=13785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=44 name=(null) inode=13785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=45 name=(null) inode=13786 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=46 name=(null) inode=13785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=47 name=(null) inode=13787 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=48 name=(null) inode=13785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=49 name=(null) inode=13788 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=50 name=(null) inode=13785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=51 name=(null) inode=13789 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=52 name=(null) inode=13785 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=53 name=(null) inode=13790 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=55 name=(null) inode=13791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=56 name=(null) inode=13791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=57 name=(null) inode=13792 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=58 name=(null) inode=13791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=59 name=(null) inode=13793 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=60 name=(null) inode=13791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=61 name=(null) inode=13794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=62 name=(null) inode=13794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=63 name=(null) inode=13795 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=64 name=(null) inode=13794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=65 name=(null) inode=13796 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=66 name=(null) inode=13794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=67 name=(null) inode=13797 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=68 name=(null) inode=13794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=69 name=(null) inode=13798 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=70 name=(null) inode=13794 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=71 name=(null) inode=13799 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=72 name=(null) inode=13791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=73 name=(null) inode=13800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=74 name=(null) inode=13800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=75 name=(null) inode=13801 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=76 name=(null) inode=13800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=77 name=(null) inode=13802 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=78 name=(null) inode=13800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=79 name=(null) inode=13803 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=80 name=(null) inode=13800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=81 name=(null) inode=13804 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=82 name=(null) inode=13800 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=83 name=(null) inode=13805 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=84 name=(null) inode=13791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=85 name=(null) inode=13806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=86 name=(null) inode=13806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=87 name=(null) inode=13807 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=88 name=(null) inode=13806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=89 name=(null) inode=13808 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=90 name=(null) inode=13806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=91 name=(null) inode=13809 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=92 name=(null) inode=13806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=93 name=(null) inode=13810 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=94 name=(null) inode=13806 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=95 name=(null) inode=13811 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=96 name=(null) inode=13791 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=97 name=(null) inode=13812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=98 name=(null) inode=13812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=99 name=(null) inode=13813 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=100 name=(null) inode=13812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=101 name=(null) inode=13814 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=102 name=(null) inode=13812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=103 name=(null) inode=13815 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=104 name=(null) inode=13812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=105 name=(null) inode=13820 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=106 name=(null) inode=13812 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=107 name=(null) inode=13821 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PATH item=109 name=(null) inode=14575 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:04.984000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:31:05.035033 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 14:31:05.035164 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:31:05.069935 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Dec 13 14:31:05.101712 kernel: EDAC MC: Ver: 3.0.0 Dec 13 14:31:05.101765 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:31:05.101805 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Dec 13 14:31:05.112425 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:31:05.120901 kernel: ACPI: button: Sleep Button [SLPF] Dec 13 14:31:05.140440 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:31:05.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.151740 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:31:05.182038 lvm[1058]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:31:05.212315 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:31:05.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.221221 systemd[1]: Reached target cryptsetup.target. Dec 13 14:31:05.231612 systemd[1]: Starting lvm2-activation.service... Dec 13 14:31:05.236992 lvm[1059]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:31:05.265161 systemd[1]: Finished lvm2-activation.service. Dec 13 14:31:05.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.274258 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:31:05.283022 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:31:05.283079 systemd[1]: Reached target local-fs.target. Dec 13 14:31:05.292032 systemd[1]: Reached target machines.target. Dec 13 14:31:05.301622 systemd[1]: Starting ldconfig.service... Dec 13 14:31:05.309766 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:31:05.309890 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:31:05.311688 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:31:05.320840 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:31:05.332649 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:31:05.334881 systemd[1]: Starting systemd-sysext.service... Dec 13 14:31:05.335670 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1061 (bootctl) Dec 13 14:31:05.337767 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:31:05.363793 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:31:05.366800 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:31:05.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.377298 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:31:05.377576 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:31:05.402925 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 14:31:05.498791 systemd-fsck[1071]: fsck.fat 4.2 (2021-01-31) Dec 13 14:31:05.498791 systemd-fsck[1071]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 14:31:05.501383 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:31:05.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.513181 systemd[1]: Mounting boot.mount... Dec 13 14:31:05.549397 systemd[1]: Mounted boot.mount. Dec 13 14:31:05.567101 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:31:05.584324 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:31:05.597890 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 14:31:05.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.637385 (sd-sysext)[1076]: Using extensions 'kubernetes'. Dec 13 14:31:05.638167 (sd-sysext)[1076]: Merged extensions into '/usr'. Dec 13 14:31:05.665981 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:05.668726 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:31:05.677302 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:31:05.681019 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:31:05.690192 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:31:05.700324 systemd[1]: Starting modprobe@loop.service... Dec 13 14:31:05.707114 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:31:05.707368 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:31:05.707555 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:05.712640 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:31:05.720653 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:31:05.720917 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:31:05.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.731390 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:31:05.732775 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:31:05.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.741787 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:31:05.742030 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:31:05.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.751818 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:31:05.752082 systemd[1]: Finished modprobe@loop.service. Dec 13 14:31:05.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.761040 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:31:05.761248 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:31:05.763618 systemd[1]: Finished systemd-sysext.service. Dec 13 14:31:05.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.774983 systemd[1]: Starting ensure-sysext.service... Dec 13 14:31:05.784363 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:31:05.797379 systemd[1]: Reloading. Dec 13 14:31:05.812836 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:31:05.816096 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:31:05.825053 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:31:05.957633 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2024-12-13T14:31:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:31:05.959085 /usr/lib/systemd/system-generators/torcx-generator[1105]: time="2024-12-13T14:31:05Z" level=info msg="torcx already run" Dec 13 14:31:06.041729 ldconfig[1060]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:31:06.117597 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:31:06.117632 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:31:06.157459 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:31:06.233000 audit: BPF prog-id=30 op=LOAD Dec 13 14:31:06.233000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:31:06.233000 audit: BPF prog-id=31 op=LOAD Dec 13 14:31:06.233000 audit: BPF prog-id=32 op=LOAD Dec 13 14:31:06.233000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:31:06.233000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:31:06.235000 audit: BPF prog-id=33 op=LOAD Dec 13 14:31:06.235000 audit: BPF prog-id=34 op=LOAD Dec 13 14:31:06.235000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:31:06.235000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:31:06.238000 audit: BPF prog-id=35 op=LOAD Dec 13 14:31:06.238000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:31:06.239000 audit: BPF prog-id=36 op=LOAD Dec 13 14:31:06.239000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:31:06.240000 audit: BPF prog-id=37 op=LOAD Dec 13 14:31:06.240000 audit: BPF prog-id=38 op=LOAD Dec 13 14:31:06.240000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:31:06.240000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:31:06.244380 systemd[1]: Finished ldconfig.service. Dec 13 14:31:06.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:06.252872 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:31:06.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:06.267462 systemd[1]: Starting audit-rules.service... Dec 13 14:31:06.277240 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:31:06.288320 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:31:06.299377 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:31:06.307000 audit: BPF prog-id=39 op=LOAD Dec 13 14:31:06.310949 systemd[1]: Starting systemd-resolved.service... Dec 13 14:31:06.317000 audit: BPF prog-id=40 op=LOAD Dec 13 14:31:06.321159 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:31:06.330316 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:31:06.337000 audit[1171]: SYSTEM_BOOT pid=1171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:31:06.338939 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:31:06.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:06.347894 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:31:06.348150 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:31:06.353000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:31:06.353000 audit[1177]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeb7c5f3a0 a2=420 a3=0 items=0 ppid=1147 pid=1177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:06.356048 augenrules[1177]: No rules Dec 13 14:31:06.353000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:31:06.357838 systemd[1]: Finished audit-rules.service. Dec 13 14:31:06.365752 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:31:06.384049 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:06.384576 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:31:06.387808 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:31:06.397284 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:31:06.406354 systemd[1]: Starting modprobe@loop.service... Dec 13 14:31:06.415273 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:31:06.423329 enable-oslogin[1185]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 14:31:06.424068 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:31:06.424448 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:31:06.427229 systemd[1]: Starting systemd-update-done.service... Dec 13 14:31:06.433995 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:31:06.434309 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:06.438220 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:31:06.438490 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:31:06.448000 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:31:06.448211 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:31:06.457944 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:31:06.458155 systemd[1]: Finished modprobe@loop.service. Dec 13 14:31:06.467952 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:31:06.468202 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:31:06.478036 systemd[1]: Finished systemd-update-done.service. Dec 13 14:31:06.487065 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:31:06.487361 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:31:06.490811 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:31:06.501891 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:06.502367 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:31:06.504732 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:31:06.513543 systemd-timesyncd[1168]: Contacted time server 169.254.169.254:123 (169.254.169.254). Dec 13 14:31:06.513626 systemd-timesyncd[1168]: Initial clock synchronization to Fri 2024-12-13 14:31:06.151669 UTC. Dec 13 14:31:06.514945 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:31:06.518606 systemd-resolved[1164]: Positive Trust Anchors: Dec 13 14:31:06.518927 systemd-resolved[1164]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:31:06.518985 systemd-resolved[1164]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:31:06.523940 systemd[1]: Starting modprobe@loop.service... Dec 13 14:31:06.533962 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:31:06.539550 enable-oslogin[1191]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 14:31:06.542057 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:31:06.542366 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:31:06.542578 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:31:06.542748 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:06.544520 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:31:06.554506 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:31:06.554766 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:31:06.561899 systemd-resolved[1164]: Defaulting to hostname 'linux'. Dec 13 14:31:06.563829 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:31:06.564081 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:31:06.573537 systemd[1]: Started systemd-resolved.service. Dec 13 14:31:06.582682 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:31:06.582953 systemd[1]: Finished modprobe@loop.service. Dec 13 14:31:06.591694 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:31:06.591964 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:31:06.604606 systemd[1]: Reached target network.target. Dec 13 14:31:06.613211 systemd[1]: Reached target nss-lookup.target. Dec 13 14:31:06.622244 systemd[1]: Reached target time-set.target. Dec 13 14:31:06.631205 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:06.631687 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:31:06.633805 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:31:06.641086 systemd-networkd[1035]: eth0: Gained IPv6LL Dec 13 14:31:06.643529 systemd[1]: Starting modprobe@drm.service... Dec 13 14:31:06.652947 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:31:06.662149 systemd[1]: Starting modprobe@loop.service... Dec 13 14:31:06.670977 systemd[1]: Starting oem-gce-enable-oslogin.service... Dec 13 14:31:06.675721 enable-oslogin[1196]: /etc/pam.d/sshd already exists. Not enabling OS Login Dec 13 14:31:06.679116 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:31:06.679413 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:31:06.681467 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:31:06.690085 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:31:06.690363 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:06.692828 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:31:06.693077 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:31:06.702723 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:31:06.702986 systemd[1]: Finished modprobe@drm.service. Dec 13 14:31:06.711707 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:31:06.711953 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:31:06.720670 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:31:06.720949 systemd[1]: Finished modprobe@loop.service. Dec 13 14:31:06.730696 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Dec 13 14:31:06.730990 systemd[1]: Finished oem-gce-enable-oslogin.service. Dec 13 14:31:06.740736 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:31:06.752107 systemd[1]: Reached target network-online.target. Dec 13 14:31:06.761091 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:31:06.761162 systemd[1]: Reached target sysinit.target. Dec 13 14:31:06.770174 systemd[1]: Started motdgen.path. Dec 13 14:31:06.777108 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:31:06.787278 systemd[1]: Started logrotate.timer. Dec 13 14:31:06.794202 systemd[1]: Started mdadm.timer. Dec 13 14:31:06.801080 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:31:06.810052 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:31:06.810127 systemd[1]: Reached target paths.target. Dec 13 14:31:06.817052 systemd[1]: Reached target timers.target. Dec 13 14:31:06.824518 systemd[1]: Listening on dbus.socket. Dec 13 14:31:06.833501 systemd[1]: Starting docker.socket... Dec 13 14:31:06.845442 systemd[1]: Listening on sshd.socket. Dec 13 14:31:06.853239 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:31:06.853340 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:31:06.854360 systemd[1]: Finished ensure-sysext.service. Dec 13 14:31:06.863334 systemd[1]: Listening on docker.socket. Dec 13 14:31:06.871205 systemd[1]: Reached target sockets.target. Dec 13 14:31:06.880014 systemd[1]: Reached target basic.target. Dec 13 14:31:06.887049 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:31:06.887098 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:31:06.888774 systemd[1]: Starting containerd.service... Dec 13 14:31:06.897586 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:31:06.908940 systemd[1]: Starting dbus.service... Dec 13 14:31:06.919955 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:31:06.928984 systemd[1]: Starting extend-filesystems.service... Dec 13 14:31:06.935435 jq[1203]: false Dec 13 14:31:06.936028 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:31:06.938502 systemd[1]: Starting kubelet.service... Dec 13 14:31:06.948084 systemd[1]: Starting motdgen.service... Dec 13 14:31:06.956876 systemd[1]: Starting oem-gce.service... Dec 13 14:31:06.964315 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:31:06.975309 systemd[1]: Starting sshd-keygen.service... Dec 13 14:31:06.986812 systemd[1]: Starting systemd-logind.service... Dec 13 14:31:06.994026 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:31:06.994167 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Dec 13 14:31:06.995006 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:31:06.996445 systemd[1]: Starting update-engine.service... Dec 13 14:31:07.002313 extend-filesystems[1204]: Found loop1 Dec 13 14:31:07.005974 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:31:07.014289 jq[1225]: true Dec 13 14:31:07.019985 extend-filesystems[1204]: Found sda Dec 13 14:31:07.028048 extend-filesystems[1204]: Found sda1 Dec 13 14:31:07.028048 extend-filesystems[1204]: Found sda2 Dec 13 14:31:07.028048 extend-filesystems[1204]: Found sda3 Dec 13 14:31:07.028048 extend-filesystems[1204]: Found usr Dec 13 14:31:07.028048 extend-filesystems[1204]: Found sda4 Dec 13 14:31:07.028048 extend-filesystems[1204]: Found sda6 Dec 13 14:31:07.028048 extend-filesystems[1204]: Found sda7 Dec 13 14:31:07.028048 extend-filesystems[1204]: Found sda9 Dec 13 14:31:07.028048 extend-filesystems[1204]: Checking size of /dev/sda9 Dec 13 14:31:07.023914 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:31:07.024351 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:31:07.028389 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:31:07.028710 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:31:07.080920 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:31:07.081220 systemd[1]: Finished motdgen.service. Dec 13 14:31:07.104436 jq[1229]: true Dec 13 14:31:07.104714 mkfs.ext4[1232]: mke2fs 1.46.5 (30-Dec-2021) Dec 13 14:31:07.104714 mkfs.ext4[1232]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Dec 13 14:31:07.104714 mkfs.ext4[1232]: Creating filesystem with 262144 4k blocks and 65536 inodes Dec 13 14:31:07.104714 mkfs.ext4[1232]: Filesystem UUID: f20eb7a8-8f5f-4690-8e7a-76efbd1975f8 Dec 13 14:31:07.104714 mkfs.ext4[1232]: Superblock backups stored on blocks: Dec 13 14:31:07.104714 mkfs.ext4[1232]: 32768, 98304, 163840, 229376 Dec 13 14:31:07.104714 mkfs.ext4[1232]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:31:07.104714 mkfs.ext4[1232]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:31:07.104714 mkfs.ext4[1232]: Creating journal (8192 blocks): done Dec 13 14:31:07.104714 mkfs.ext4[1232]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Dec 13 14:31:07.117628 dbus-daemon[1202]: [system] SELinux support is enabled Dec 13 14:31:07.117961 systemd[1]: Started dbus.service. Dec 13 14:31:07.121608 umount[1238]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Dec 13 14:31:07.130190 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:31:07.130282 systemd[1]: Reached target system-config.target. Dec 13 14:31:07.133585 dbus-daemon[1202]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1035 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 14:31:07.138074 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:31:07.138139 systemd[1]: Reached target user-config.target. Dec 13 14:31:07.148059 dbus-daemon[1202]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 14:31:07.149935 extend-filesystems[1204]: Resized partition /dev/sda9 Dec 13 14:31:07.155352 systemd[1]: Starting systemd-hostnamed.service... Dec 13 14:31:07.159445 extend-filesystems[1254]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:31:07.187097 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Dec 13 14:31:07.187157 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 14:31:07.218872 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Dec 13 14:31:07.235989 update_engine[1224]: I1213 14:31:07.235826 1224 main.cc:92] Flatcar Update Engine starting Dec 13 14:31:07.245567 systemd[1]: Started update-engine.service. Dec 13 14:31:07.246464 extend-filesystems[1254]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Dec 13 14:31:07.246464 extend-filesystems[1254]: old_desc_blocks = 1, new_desc_blocks = 2 Dec 13 14:31:07.246464 extend-filesystems[1254]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Dec 13 14:31:07.332074 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:31:07.327122 dbus-daemon[1202]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 14:31:07.332253 extend-filesystems[1204]: Resized filesystem in /dev/sda9 Dec 13 14:31:07.266522 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:31:07.347307 update_engine[1224]: I1213 14:31:07.252200 1224 update_check_scheduler.cc:74] Next update check in 11m45s Dec 13 14:31:07.347376 bash[1262]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:31:07.327769 dbus-daemon[1202]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.5' (uid=0 pid=1255 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 14:31:07.347775 env[1231]: time="2024-12-13T14:31:07.335814935Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:31:07.266824 systemd[1]: Finished extend-filesystems.service. Dec 13 14:31:07.290142 systemd[1]: Started locksmithd.service. Dec 13 14:31:07.301919 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:31:07.327326 systemd[1]: Started systemd-hostnamed.service. Dec 13 14:31:07.345178 systemd[1]: Starting polkit.service... Dec 13 14:31:07.416300 env[1231]: time="2024-12-13T14:31:07.416235925Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:31:07.416986 env[1231]: time="2024-12-13T14:31:07.416950058Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:31:07.423207 env[1231]: time="2024-12-13T14:31:07.420306086Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:31:07.423207 env[1231]: time="2024-12-13T14:31:07.420358592Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:31:07.423207 env[1231]: time="2024-12-13T14:31:07.420717596Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:31:07.423207 env[1231]: time="2024-12-13T14:31:07.420751437Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:31:07.423207 env[1231]: time="2024-12-13T14:31:07.420774730Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:31:07.423207 env[1231]: time="2024-12-13T14:31:07.420792300Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:31:07.423207 env[1231]: time="2024-12-13T14:31:07.420947946Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:31:07.423207 env[1231]: time="2024-12-13T14:31:07.421265855Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:31:07.423207 env[1231]: time="2024-12-13T14:31:07.421483774Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:31:07.423207 env[1231]: time="2024-12-13T14:31:07.421506261Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:31:07.423738 env[1231]: time="2024-12-13T14:31:07.421566530Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:31:07.423738 env[1231]: time="2024-12-13T14:31:07.421583015Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:31:07.433809 env[1231]: time="2024-12-13T14:31:07.433753025Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:31:07.434302 env[1231]: time="2024-12-13T14:31:07.433834138Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:31:07.434302 env[1231]: time="2024-12-13T14:31:07.433886134Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:31:07.434428 env[1231]: time="2024-12-13T14:31:07.434364331Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:31:07.434485 env[1231]: time="2024-12-13T14:31:07.434391276Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:31:07.434534 env[1231]: time="2024-12-13T14:31:07.434488575Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:31:07.434534 env[1231]: time="2024-12-13T14:31:07.434513504Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:31:07.434620 env[1231]: time="2024-12-13T14:31:07.434537000Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:31:07.434620 env[1231]: time="2024-12-13T14:31:07.434560807Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:31:07.434620 env[1231]: time="2024-12-13T14:31:07.434584007Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:31:07.434620 env[1231]: time="2024-12-13T14:31:07.434605271Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:31:07.434781 env[1231]: time="2024-12-13T14:31:07.434625801Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:31:07.434870 env[1231]: time="2024-12-13T14:31:07.434803639Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:31:07.434993 env[1231]: time="2024-12-13T14:31:07.434966683Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:31:07.435525 env[1231]: time="2024-12-13T14:31:07.435494225Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:31:07.435595 env[1231]: time="2024-12-13T14:31:07.435543319Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:31:07.435595 env[1231]: time="2024-12-13T14:31:07.435567090Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:31:07.435695 env[1231]: time="2024-12-13T14:31:07.435650016Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:31:07.435695 env[1231]: time="2024-12-13T14:31:07.435673318Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:31:07.437885 env[1231]: time="2024-12-13T14:31:07.435778816Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:31:07.437885 env[1231]: time="2024-12-13T14:31:07.435805149Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:31:07.437885 env[1231]: time="2024-12-13T14:31:07.435825029Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:31:07.437885 env[1231]: time="2024-12-13T14:31:07.435870416Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:31:07.437885 env[1231]: time="2024-12-13T14:31:07.435890498Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:31:07.437885 env[1231]: time="2024-12-13T14:31:07.435907836Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:31:07.437885 env[1231]: time="2024-12-13T14:31:07.435929542Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:31:07.437885 env[1231]: time="2024-12-13T14:31:07.436103122Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:31:07.437885 env[1231]: time="2024-12-13T14:31:07.436125566Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:31:07.437885 env[1231]: time="2024-12-13T14:31:07.436146457Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:31:07.437885 env[1231]: time="2024-12-13T14:31:07.436165426Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:31:07.437885 env[1231]: time="2024-12-13T14:31:07.436188348Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:31:07.437885 env[1231]: time="2024-12-13T14:31:07.436204983Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:31:07.437885 env[1231]: time="2024-12-13T14:31:07.436232685Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:31:07.438526 env[1231]: time="2024-12-13T14:31:07.436312349Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:31:07.438581 env[1231]: time="2024-12-13T14:31:07.436598248Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:31:07.438581 env[1231]: time="2024-12-13T14:31:07.436690242Z" level=info msg="Connect containerd service" Dec 13 14:31:07.438581 env[1231]: time="2024-12-13T14:31:07.436740653Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:31:07.443872 env[1231]: time="2024-12-13T14:31:07.442275222Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:31:07.443872 env[1231]: time="2024-12-13T14:31:07.442732005Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:31:07.443872 env[1231]: time="2024-12-13T14:31:07.442795731Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:31:07.443872 env[1231]: time="2024-12-13T14:31:07.443262458Z" level=info msg="containerd successfully booted in 0.108753s" Dec 13 14:31:07.443001 systemd[1]: Started containerd.service. Dec 13 14:31:07.471164 polkitd[1273]: Started polkitd version 121 Dec 13 14:31:07.479690 env[1231]: time="2024-12-13T14:31:07.479607034Z" level=info msg="Start subscribing containerd event" Dec 13 14:31:07.479894 env[1231]: time="2024-12-13T14:31:07.479712426Z" level=info msg="Start recovering state" Dec 13 14:31:07.479894 env[1231]: time="2024-12-13T14:31:07.479817697Z" level=info msg="Start event monitor" Dec 13 14:31:07.479894 env[1231]: time="2024-12-13T14:31:07.479859686Z" level=info msg="Start snapshots syncer" Dec 13 14:31:07.479894 env[1231]: time="2024-12-13T14:31:07.479877888Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:31:07.479894 env[1231]: time="2024-12-13T14:31:07.479890318Z" level=info msg="Start streaming server" Dec 13 14:31:07.515087 systemd-logind[1222]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:31:07.515135 systemd-logind[1222]: Watching system buttons on /dev/input/event3 (Sleep Button) Dec 13 14:31:07.515167 systemd-logind[1222]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:31:07.522003 systemd-logind[1222]: New seat seat0. Dec 13 14:31:07.530142 systemd[1]: Started systemd-logind.service. Dec 13 14:31:07.538524 polkitd[1273]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 14:31:07.538616 polkitd[1273]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 14:31:07.557415 polkitd[1273]: Finished loading, compiling and executing 2 rules Dec 13 14:31:07.558529 dbus-daemon[1202]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 14:31:07.558747 systemd[1]: Started polkit.service. Dec 13 14:31:07.559392 polkitd[1273]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 14:31:07.633977 coreos-metadata[1201]: Dec 13 14:31:07.633 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Dec 13 14:31:07.637447 systemd-hostnamed[1255]: Hostname set to (transient) Dec 13 14:31:07.640589 systemd-resolved[1164]: System hostname changed to 'ci-3510-3-6-01f5cf1df0c7eb1433f8.c.flatcar-212911.internal'. Dec 13 14:31:07.641341 coreos-metadata[1201]: Dec 13 14:31:07.641 INFO Fetch failed with 404: resource not found Dec 13 14:31:07.641548 coreos-metadata[1201]: Dec 13 14:31:07.641 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Dec 13 14:31:07.642713 coreos-metadata[1201]: Dec 13 14:31:07.642 INFO Fetch successful Dec 13 14:31:07.642961 coreos-metadata[1201]: Dec 13 14:31:07.642 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Dec 13 14:31:07.644038 coreos-metadata[1201]: Dec 13 14:31:07.643 INFO Fetch failed with 404: resource not found Dec 13 14:31:07.644151 coreos-metadata[1201]: Dec 13 14:31:07.644 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Dec 13 14:31:07.645066 coreos-metadata[1201]: Dec 13 14:31:07.644 INFO Fetch failed with 404: resource not found Dec 13 14:31:07.645066 coreos-metadata[1201]: Dec 13 14:31:07.644 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Dec 13 14:31:07.645908 coreos-metadata[1201]: Dec 13 14:31:07.645 INFO Fetch successful Dec 13 14:31:07.649482 unknown[1201]: wrote ssh authorized keys file for user: core Dec 13 14:31:07.673201 update-ssh-keys[1282]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:31:07.673810 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:31:08.443924 sshd_keygen[1234]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:31:08.488506 systemd[1]: Finished sshd-keygen.service. Dec 13 14:31:08.496992 systemd[1]: Starting issuegen.service... Dec 13 14:31:08.508266 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:31:08.508448 systemd[1]: Finished issuegen.service. Dec 13 14:31:08.518553 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:31:08.532425 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:31:08.544202 systemd[1]: Started getty@tty1.service. Dec 13 14:31:08.555057 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:31:08.563427 systemd[1]: Reached target getty.target. Dec 13 14:31:08.717735 locksmithd[1269]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:31:09.022468 systemd[1]: Started kubelet.service. Dec 13 14:31:10.127941 kubelet[1302]: E1213 14:31:10.127834 1302 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:31:10.131183 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:31:10.131432 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:31:10.131866 systemd[1]: kubelet.service: Consumed 1.439s CPU time. Dec 13 14:31:12.048015 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Dec 13 14:31:14.188881 kernel: loop2: detected capacity change from 0 to 2097152 Dec 13 14:31:14.221641 systemd-nspawn[1310]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Dec 13 14:31:14.221641 systemd-nspawn[1310]: Press ^] three times within 1s to kill container. Dec 13 14:31:14.236884 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:31:14.318539 systemd[1]: Started oem-gce.service. Dec 13 14:31:14.319051 systemd[1]: Reached target multi-user.target. Dec 13 14:31:14.321235 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:31:14.332593 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:31:14.332886 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:31:14.336959 systemd[1]: Startup finished in 1.052s (kernel) + 7.263s (initrd) + 15.261s (userspace) = 23.577s. Dec 13 14:31:14.393400 systemd-nspawn[1310]: + '[' -e /etc/default/instance_configs.cfg.template ']' Dec 13 14:31:14.393400 systemd-nspawn[1310]: + echo -e '[InstanceSetup]\nset_host_keys = false' Dec 13 14:31:14.393626 systemd-nspawn[1310]: + /usr/bin/google_instance_setup Dec 13 14:31:15.054535 instance-setup[1316]: INFO Running google_set_multiqueue. Dec 13 14:31:15.069201 instance-setup[1316]: INFO Set channels for eth0 to 2. Dec 13 14:31:15.073016 instance-setup[1316]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Dec 13 14:31:15.074466 instance-setup[1316]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Dec 13 14:31:15.075067 instance-setup[1316]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Dec 13 14:31:15.076349 instance-setup[1316]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Dec 13 14:31:15.076721 instance-setup[1316]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Dec 13 14:31:15.078141 instance-setup[1316]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Dec 13 14:31:15.078592 instance-setup[1316]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Dec 13 14:31:15.080078 instance-setup[1316]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Dec 13 14:31:15.091792 instance-setup[1316]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Dec 13 14:31:15.092450 instance-setup[1316]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Dec 13 14:31:15.135938 systemd-nspawn[1310]: + /usr/bin/google_metadata_script_runner --script-type startup Dec 13 14:31:15.469092 startup-script[1347]: INFO Starting startup scripts. Dec 13 14:31:15.482600 startup-script[1347]: INFO No startup scripts found in metadata. Dec 13 14:31:15.482774 startup-script[1347]: INFO Finished running startup scripts. Dec 13 14:31:15.519662 systemd-nspawn[1310]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Dec 13 14:31:15.520261 systemd-nspawn[1310]: + daemon_pids=() Dec 13 14:31:15.520261 systemd-nspawn[1310]: + for d in accounts clock_skew network Dec 13 14:31:15.520261 systemd-nspawn[1310]: + daemon_pids+=($!) Dec 13 14:31:15.520500 systemd-nspawn[1310]: + for d in accounts clock_skew network Dec 13 14:31:15.520611 systemd-nspawn[1310]: + daemon_pids+=($!) Dec 13 14:31:15.520715 systemd-nspawn[1310]: + for d in accounts clock_skew network Dec 13 14:31:15.520996 systemd-nspawn[1310]: + daemon_pids+=($!) Dec 13 14:31:15.521130 systemd-nspawn[1310]: + NOTIFY_SOCKET=/run/systemd/notify Dec 13 14:31:15.521130 systemd-nspawn[1310]: + /usr/bin/systemd-notify --ready Dec 13 14:31:15.521450 systemd-nspawn[1310]: + /usr/bin/google_network_daemon Dec 13 14:31:15.521788 systemd-nspawn[1310]: + /usr/bin/google_clock_skew_daemon Dec 13 14:31:15.522200 systemd-nspawn[1310]: + /usr/bin/google_accounts_daemon Dec 13 14:31:15.573741 systemd-nspawn[1310]: + wait -n 36 37 38 Dec 13 14:31:16.147102 google-networking[1352]: INFO Starting Google Networking daemon. Dec 13 14:31:16.193207 google-clock-skew[1351]: INFO Starting Google Clock Skew daemon. Dec 13 14:31:16.212549 google-clock-skew[1351]: INFO Clock drift token has changed: 0. Dec 13 14:31:16.217602 systemd-nspawn[1310]: hwclock: Cannot access the Hardware Clock via any known method. Dec 13 14:31:16.217986 systemd-nspawn[1310]: hwclock: Use the --verbose option to see the details of our search for an access method. Dec 13 14:31:16.219030 google-clock-skew[1351]: WARNING Failed to sync system time with hardware clock. Dec 13 14:31:16.296369 groupadd[1362]: group added to /etc/group: name=google-sudoers, GID=1000 Dec 13 14:31:16.299659 groupadd[1362]: group added to /etc/gshadow: name=google-sudoers Dec 13 14:31:16.303886 groupadd[1362]: new group: name=google-sudoers, GID=1000 Dec 13 14:31:16.317048 google-accounts[1350]: INFO Starting Google Accounts daemon. Dec 13 14:31:16.342468 google-accounts[1350]: WARNING OS Login not installed. Dec 13 14:31:16.343494 google-accounts[1350]: INFO Creating a new user account for 0. Dec 13 14:31:16.348592 systemd-nspawn[1310]: useradd: invalid user name '0': use --badname to ignore Dec 13 14:31:16.349326 google-accounts[1350]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Dec 13 14:31:16.466928 systemd[1]: Created slice system-sshd.slice. Dec 13 14:31:16.469430 systemd[1]: Started sshd@0-10.128.0.60:22-139.178.68.195:56818.service. Dec 13 14:31:16.774998 sshd[1373]: Accepted publickey for core from 139.178.68.195 port 56818 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:31:16.779391 sshd[1373]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:16.797037 systemd[1]: Created slice user-500.slice. Dec 13 14:31:16.799146 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:31:16.808959 systemd-logind[1222]: New session 1 of user core. Dec 13 14:31:16.816136 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:31:16.818706 systemd[1]: Starting user@500.service... Dec 13 14:31:16.832199 (systemd)[1376]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:16.936568 systemd[1376]: Queued start job for default target default.target. Dec 13 14:31:16.937427 systemd[1376]: Reached target paths.target. Dec 13 14:31:16.937472 systemd[1376]: Reached target sockets.target. Dec 13 14:31:16.937495 systemd[1376]: Reached target timers.target. Dec 13 14:31:16.937516 systemd[1376]: Reached target basic.target. Dec 13 14:31:16.937690 systemd[1]: Started user@500.service. Dec 13 14:31:16.939237 systemd[1]: Started session-1.scope. Dec 13 14:31:16.939984 systemd[1376]: Reached target default.target. Dec 13 14:31:16.940270 systemd[1376]: Startup finished in 99ms. Dec 13 14:31:17.158814 systemd[1]: Started sshd@1-10.128.0.60:22-139.178.68.195:56832.service. Dec 13 14:31:17.442884 sshd[1385]: Accepted publickey for core from 139.178.68.195 port 56832 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:31:17.444717 sshd[1385]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:17.451380 systemd-logind[1222]: New session 2 of user core. Dec 13 14:31:17.452157 systemd[1]: Started session-2.scope. Dec 13 14:31:17.655342 sshd[1385]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:17.660748 systemd[1]: sshd@1-10.128.0.60:22-139.178.68.195:56832.service: Deactivated successfully. Dec 13 14:31:17.661961 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:31:17.662825 systemd-logind[1222]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:31:17.664100 systemd-logind[1222]: Removed session 2. Dec 13 14:31:17.701052 systemd[1]: Started sshd@2-10.128.0.60:22-139.178.68.195:56840.service. Dec 13 14:31:17.984263 sshd[1391]: Accepted publickey for core from 139.178.68.195 port 56840 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:31:17.986265 sshd[1391]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:17.992798 systemd-logind[1222]: New session 3 of user core. Dec 13 14:31:17.993564 systemd[1]: Started session-3.scope. Dec 13 14:31:18.190398 sshd[1391]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:18.194696 systemd[1]: sshd@2-10.128.0.60:22-139.178.68.195:56840.service: Deactivated successfully. Dec 13 14:31:18.195773 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:31:18.196702 systemd-logind[1222]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:31:18.197959 systemd-logind[1222]: Removed session 3. Dec 13 14:31:18.235921 systemd[1]: Started sshd@3-10.128.0.60:22-139.178.68.195:56842.service. Dec 13 14:31:18.520665 sshd[1397]: Accepted publickey for core from 139.178.68.195 port 56842 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:31:18.522396 sshd[1397]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:18.529107 systemd[1]: Started session-4.scope. Dec 13 14:31:18.529723 systemd-logind[1222]: New session 4 of user core. Dec 13 14:31:18.732876 sshd[1397]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:18.737051 systemd[1]: sshd@3-10.128.0.60:22-139.178.68.195:56842.service: Deactivated successfully. Dec 13 14:31:18.738155 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:31:18.739024 systemd-logind[1222]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:31:18.740340 systemd-logind[1222]: Removed session 4. Dec 13 14:31:18.778658 systemd[1]: Started sshd@4-10.128.0.60:22-139.178.68.195:56852.service. Dec 13 14:31:19.065188 sshd[1403]: Accepted publickey for core from 139.178.68.195 port 56852 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:31:19.066914 sshd[1403]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:19.073656 systemd[1]: Started session-5.scope. Dec 13 14:31:19.074503 systemd-logind[1222]: New session 5 of user core. Dec 13 14:31:19.262338 sudo[1406]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:31:19.262855 sudo[1406]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:31:19.273143 dbus-daemon[1202]: Ѝ\x86\x91\xcdU: received setenforce notice (enforcing=491231856) Dec 13 14:31:19.275356 sudo[1406]: pam_unix(sudo:session): session closed for user root Dec 13 14:31:19.319795 sshd[1403]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:19.324585 systemd[1]: sshd@4-10.128.0.60:22-139.178.68.195:56852.service: Deactivated successfully. Dec 13 14:31:19.325783 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:31:19.326661 systemd-logind[1222]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:31:19.328098 systemd-logind[1222]: Removed session 5. Dec 13 14:31:19.365560 systemd[1]: Started sshd@5-10.128.0.60:22-139.178.68.195:56864.service. Dec 13 14:31:19.651693 sshd[1410]: Accepted publickey for core from 139.178.68.195 port 56864 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:31:19.654006 sshd[1410]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:19.661103 systemd[1]: Started session-6.scope. Dec 13 14:31:19.661978 systemd-logind[1222]: New session 6 of user core. Dec 13 14:31:19.828447 sudo[1414]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:31:19.828896 sudo[1414]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:31:19.833198 sudo[1414]: pam_unix(sudo:session): session closed for user root Dec 13 14:31:19.845933 sudo[1413]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:31:19.846358 sudo[1413]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:31:19.859198 systemd[1]: Stopping audit-rules.service... Dec 13 14:31:19.860000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:31:19.866753 kernel: kauditd_printk_skb: 217 callbacks suppressed Dec 13 14:31:19.866918 kernel: audit: type=1305 audit(1734100279.860:198): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:31:19.866962 auditctl[1417]: No rules Dec 13 14:31:19.867967 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:31:19.868225 systemd[1]: Stopped audit-rules.service. Dec 13 14:31:19.860000 audit[1417]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff02fee1d0 a2=420 a3=0 items=0 ppid=1 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.883164 systemd[1]: Starting audit-rules.service... Dec 13 14:31:19.911820 kernel: audit: type=1300 audit(1734100279.860:198): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff02fee1d0 a2=420 a3=0 items=0 ppid=1 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:19.912030 kernel: audit: type=1327 audit(1734100279.860:198): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:31:19.860000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:31:19.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:19.942737 kernel: audit: type=1131 audit(1734100279.865:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:19.949110 augenrules[1434]: No rules Dec 13 14:31:19.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:19.949898 systemd[1]: Finished audit-rules.service. Dec 13 14:31:19.956772 sudo[1413]: pam_unix(sudo:session): session closed for user root Dec 13 14:31:19.955000 audit[1413]: USER_END pid=1413 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:31:19.997113 kernel: audit: type=1130 audit(1734100279.949:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:19.997276 kernel: audit: type=1106 audit(1734100279.955:201): pid=1413 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:31:19.997329 kernel: audit: type=1104 audit(1734100279.955:202): pid=1413 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:31:19.955000 audit[1413]: CRED_DISP pid=1413 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:31:20.003170 sshd[1410]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:20.008681 systemd-logind[1222]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:31:20.011157 systemd[1]: sshd@5-10.128.0.60:22-139.178.68.195:56864.service: Deactivated successfully. Dec 13 14:31:20.012284 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:31:20.014465 systemd-logind[1222]: Removed session 6. Dec 13 14:31:20.002000 audit[1410]: USER_END pid=1410 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:20.055039 kernel: audit: type=1106 audit(1734100280.002:203): pid=1410 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:20.055168 kernel: audit: type=1104 audit(1734100280.002:204): pid=1410 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:20.002000 audit[1410]: CRED_DISP pid=1410 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:20.051180 systemd[1]: Started sshd@6-10.128.0.60:22-139.178.68.195:56868.service. Dec 13 14:31:20.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.60:22-139.178.68.195:56864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:20.099873 kernel: audit: type=1131 audit(1734100280.007:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.60:22-139.178.68.195:56864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:20.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.60:22-139.178.68.195:56868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:20.290743 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:31:20.291192 systemd[1]: Stopped kubelet.service. Dec 13 14:31:20.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:20.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:20.291291 systemd[1]: kubelet.service: Consumed 1.439s CPU time. Dec 13 14:31:20.294714 systemd[1]: Starting kubelet.service... Dec 13 14:31:20.352000 audit[1440]: USER_ACCT pid=1440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:20.355035 sshd[1440]: Accepted publickey for core from 139.178.68.195 port 56868 ssh2: RSA SHA256:46IhXbRhLpnxjtaVY1jZn9R5WA0GgkyNT5hX964MgBk Dec 13 14:31:20.355000 audit[1440]: CRED_ACQ pid=1440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:20.355000 audit[1440]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0d466680 a2=3 a3=0 items=0 ppid=1 pid=1440 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:20.355000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:20.357656 sshd[1440]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:20.366420 systemd[1]: Started session-7.scope. Dec 13 14:31:20.368867 systemd-logind[1222]: New session 7 of user core. Dec 13 14:31:20.378000 audit[1440]: USER_START pid=1440 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:20.382000 audit[1444]: CRED_ACQ pid=1444 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:20.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:20.519122 systemd[1]: Started kubelet.service. Dec 13 14:31:20.538000 audit[1447]: USER_ACCT pid=1447 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:31:20.540807 sudo[1447]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:31:20.539000 audit[1447]: CRED_REFR pid=1447 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:31:20.541492 sudo[1447]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:31:20.543000 audit[1447]: USER_START pid=1447 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:31:20.567138 systemd[1]: Starting coreos-metadata.service... Dec 13 14:31:20.637490 kubelet[1448]: E1213 14:31:20.637418 1448 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:31:20.642961 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:31:20.643175 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:31:20.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:31:20.648067 coreos-metadata[1457]: Dec 13 14:31:20.647 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/hostname: Attempt #1 Dec 13 14:31:20.649717 coreos-metadata[1457]: Dec 13 14:31:20.649 INFO Fetch successful Dec 13 14:31:20.649884 coreos-metadata[1457]: Dec 13 14:31:20.649 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip: Attempt #1 Dec 13 14:31:20.650631 coreos-metadata[1457]: Dec 13 14:31:20.650 INFO Fetch successful Dec 13 14:31:20.650734 coreos-metadata[1457]: Dec 13 14:31:20.650 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/ip: Attempt #1 Dec 13 14:31:20.651413 coreos-metadata[1457]: Dec 13 14:31:20.651 INFO Fetch successful Dec 13 14:31:20.651534 coreos-metadata[1457]: Dec 13 14:31:20.651 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/machine-type: Attempt #1 Dec 13 14:31:20.652222 coreos-metadata[1457]: Dec 13 14:31:20.652 INFO Fetch successful Dec 13 14:31:20.662970 systemd[1]: Finished coreos-metadata.service. Dec 13 14:31:20.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:21.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:21.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:21.659169 systemd[1]: Stopped kubelet.service. Dec 13 14:31:21.663055 systemd[1]: Starting kubelet.service... Dec 13 14:31:21.699613 systemd[1]: Reloading. Dec 13 14:31:21.843357 /usr/lib/systemd/system-generators/torcx-generator[1515]: time="2024-12-13T14:31:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:31:21.853981 /usr/lib/systemd/system-generators/torcx-generator[1515]: time="2024-12-13T14:31:21Z" level=info msg="torcx already run" Dec 13 14:31:21.967219 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:31:21.967248 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:31:21.991860 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:31:22.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit: BPF prog-id=49 op=LOAD Dec 13 14:31:22.085000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:31:22.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit: BPF prog-id=50 op=LOAD Dec 13 14:31:22.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.085000 audit: BPF prog-id=51 op=LOAD Dec 13 14:31:22.085000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:31:22.085000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:31:22.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit: BPF prog-id=52 op=LOAD Dec 13 14:31:22.087000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:31:22.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit: BPF prog-id=53 op=LOAD Dec 13 14:31:22.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.087000 audit: BPF prog-id=54 op=LOAD Dec 13 14:31:22.087000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:31:22.087000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:31:22.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.091000 audit: BPF prog-id=55 op=LOAD Dec 13 14:31:22.091000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:31:22.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.092000 audit: BPF prog-id=56 op=LOAD Dec 13 14:31:22.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.093000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.093000 audit: BPF prog-id=57 op=LOAD Dec 13 14:31:22.093000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:31:22.093000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:31:22.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.094000 audit: BPF prog-id=58 op=LOAD Dec 13 14:31:22.094000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:31:22.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.096000 audit: BPF prog-id=59 op=LOAD Dec 13 14:31:22.097000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:31:22.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.097000 audit: BPF prog-id=60 op=LOAD Dec 13 14:31:22.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.097000 audit: BPF prog-id=61 op=LOAD Dec 13 14:31:22.097000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:31:22.097000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:31:22.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.098000 audit: BPF prog-id=62 op=LOAD Dec 13 14:31:22.098000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:31:22.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.101000 audit: BPF prog-id=63 op=LOAD Dec 13 14:31:22.101000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit: BPF prog-id=64 op=LOAD Dec 13 14:31:22.125000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit: BPF prog-id=65 op=LOAD Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:22.125000 audit: BPF prog-id=66 op=LOAD Dec 13 14:31:22.125000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:31:22.125000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:31:22.152492 systemd[1]: Started kubelet.service. Dec 13 14:31:22.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:22.155354 systemd[1]: Stopping kubelet.service... Dec 13 14:31:22.156160 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:31:22.156436 systemd[1]: Stopped kubelet.service. Dec 13 14:31:22.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:22.158829 systemd[1]: Starting kubelet.service... Dec 13 14:31:22.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:22.356673 systemd[1]: Started kubelet.service. Dec 13 14:31:22.421007 kubelet[1565]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:31:22.421007 kubelet[1565]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:31:22.421007 kubelet[1565]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:31:22.421587 kubelet[1565]: I1213 14:31:22.421135 1565 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:31:23.092491 kubelet[1565]: I1213 14:31:23.092439 1565 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:31:23.092491 kubelet[1565]: I1213 14:31:23.092478 1565 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:31:23.093631 kubelet[1565]: I1213 14:31:23.093586 1565 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:31:23.150430 kubelet[1565]: I1213 14:31:23.149786 1565 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:31:23.166578 kubelet[1565]: I1213 14:31:23.166537 1565 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:31:23.167052 kubelet[1565]: I1213 14:31:23.166986 1565 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:31:23.167296 kubelet[1565]: I1213 14:31:23.167272 1565 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:31:23.168600 kubelet[1565]: I1213 14:31:23.168569 1565 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:31:23.168723 kubelet[1565]: I1213 14:31:23.168606 1565 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:31:23.171698 kubelet[1565]: I1213 14:31:23.171661 1565 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:31:23.171914 kubelet[1565]: I1213 14:31:23.171890 1565 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:31:23.172007 kubelet[1565]: I1213 14:31:23.171926 1565 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:31:23.172007 kubelet[1565]: I1213 14:31:23.171968 1565 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:31:23.172007 kubelet[1565]: I1213 14:31:23.172002 1565 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:31:23.173832 kubelet[1565]: E1213 14:31:23.173772 1565 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:23.175520 kubelet[1565]: I1213 14:31:23.175497 1565 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:31:23.185477 kubelet[1565]: E1213 14:31:23.185366 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:23.189176 kubelet[1565]: I1213 14:31:23.189115 1565 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:31:23.191040 kubelet[1565]: W1213 14:31:23.190994 1565 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:31:23.191876 kubelet[1565]: I1213 14:31:23.191823 1565 server.go:1256] "Started kubelet" Dec 13 14:31:23.192187 kubelet[1565]: I1213 14:31:23.192160 1565 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:31:23.193374 kubelet[1565]: I1213 14:31:23.193347 1565 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:31:23.192000 audit[1565]: AVC avc: denied { mac_admin } for pid=1565 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:23.192000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:31:23.192000 audit[1565]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b082d0 a1=c00007b6c8 a2=c000b082a0 a3=25 items=0 ppid=1 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:23.192000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:31:23.194331 kubelet[1565]: I1213 14:31:23.194305 1565 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:31:23.193000 audit[1565]: AVC avc: denied { mac_admin } for pid=1565 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:23.193000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:31:23.193000 audit[1565]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cedc20 a1=c00007b6f8 a2=c000b08360 a3=25 items=0 ppid=1 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:23.193000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:31:23.194799 kubelet[1565]: I1213 14:31:23.194780 1565 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:31:23.195026 kubelet[1565]: I1213 14:31:23.195007 1565 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:31:23.203380 kubelet[1565]: I1213 14:31:23.195016 1565 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:31:23.203894 kubelet[1565]: I1213 14:31:23.203866 1565 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:31:23.204165 kubelet[1565]: I1213 14:31:23.204148 1565 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:31:23.207278 kubelet[1565]: I1213 14:31:23.207252 1565 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:31:23.207537 kubelet[1565]: I1213 14:31:23.207523 1565 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:31:23.216091 kubelet[1565]: I1213 14:31:23.216044 1565 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:31:23.216232 kubelet[1565]: I1213 14:31:23.216181 1565 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:31:23.230732 kubelet[1565]: I1213 14:31:23.230559 1565 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:31:23.256984 kubelet[1565]: E1213 14:31:23.256946 1565 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:31:23.264805 kubelet[1565]: E1213 14:31:23.262127 1565 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.128.0.60\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 14:31:23.264805 kubelet[1565]: W1213 14:31:23.262265 1565 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:31:23.264805 kubelet[1565]: E1213 14:31:23.262291 1565 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 14:31:23.264805 kubelet[1565]: W1213 14:31:23.262353 1565 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: nodes "10.128.0.60" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:31:23.264805 kubelet[1565]: E1213 14:31:23.262369 1565 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.128.0.60" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 14:31:23.264805 kubelet[1565]: W1213 14:31:23.262414 1565 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:31:23.264805 kubelet[1565]: E1213 14:31:23.262428 1565 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 14:31:23.268747 kubelet[1565]: E1213 14:31:23.268026 1565 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.128.0.60.1810c305188cf968 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.128.0.60,UID:10.128.0.60,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.128.0.60,},FirstTimestamp:2024-12-13 14:31:23.191785832 +0000 UTC m=+0.827555569,LastTimestamp:2024-12-13 14:31:23.191785832 +0000 UTC m=+0.827555569,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.128.0.60,}" Dec 13 14:31:23.268747 kubelet[1565]: I1213 14:31:23.268397 1565 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:31:23.268747 kubelet[1565]: I1213 14:31:23.268413 1565 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:31:23.268747 kubelet[1565]: I1213 14:31:23.268437 1565 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:31:23.270000 audit[1577]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1577 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:23.270000 audit[1577]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffca585e1a0 a2=0 a3=7ffca585e18c items=0 ppid=1565 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:23.270000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:31:23.272390 kubelet[1565]: I1213 14:31:23.272362 1565 policy_none.go:49] "None policy: Start" Dec 13 14:31:23.273666 kubelet[1565]: I1213 14:31:23.273644 1565 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:31:23.273839 kubelet[1565]: I1213 14:31:23.273822 1565 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:31:23.273000 audit[1582]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1582 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:23.273000 audit[1582]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd46306750 a2=0 a3=7ffd4630673c items=0 ppid=1565 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:23.273000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:31:23.277969 kubelet[1565]: E1213 14:31:23.277929 1565 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.128.0.60.1810c3051c6ec67c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.128.0.60,UID:10.128.0.60,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:10.128.0.60,},FirstTimestamp:2024-12-13 14:31:23.25691558 +0000 UTC m=+0.892685313,LastTimestamp:2024-12-13 14:31:23.25691558 +0000 UTC m=+0.892685313,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.128.0.60,}" Dec 13 14:31:23.282754 systemd[1]: Created slice kubepods.slice. Dec 13 14:31:23.276000 audit[1584]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1584 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:23.276000 audit[1584]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffd1396430 a2=0 a3=7fffd139641c items=0 ppid=1565 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:23.276000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:31:23.298000 audit[1589]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1589 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:23.298000 audit[1589]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe3a00f210 a2=0 a3=7ffe3a00f1fc items=0 ppid=1565 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:23.298000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:31:23.307276 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:31:23.310162 kubelet[1565]: I1213 14:31:23.307238 1565 kubelet_node_status.go:73] "Attempting to register node" node="10.128.0.60" Dec 13 14:31:23.318214 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:31:23.325214 kubelet[1565]: I1213 14:31:23.325174 1565 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:31:23.325373 kubelet[1565]: I1213 14:31:23.325301 1565 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:31:23.324000 audit[1565]: AVC avc: denied { mac_admin } for pid=1565 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:23.324000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:31:23.324000 audit[1565]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ce7470 a1=c000bfd0e0 a2=c000ce7440 a3=25 items=0 ppid=1 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:23.324000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:31:23.325889 kubelet[1565]: I1213 14:31:23.325655 1565 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:31:23.331338 kubelet[1565]: E1213 14:31:23.331285 1565 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.128.0.60\" not found" Dec 13 14:31:23.333825 kubelet[1565]: I1213 14:31:23.333146 1565 kubelet_node_status.go:76] "Successfully registered node" node="10.128.0.60" Dec 13 14:31:23.373000 audit[1595]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1595 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:23.373000 audit[1595]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffdcc01650 a2=0 a3=7fffdcc0163c items=0 ppid=1565 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:23.373000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:31:23.377719 kubelet[1565]: I1213 14:31:23.377680 1565 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:31:23.378000 audit[1596]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1596 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:23.378000 audit[1596]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcc51d2d10 a2=0 a3=7ffcc51d2cfc items=0 ppid=1565 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:23.378000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:31:23.380178 kubelet[1565]: I1213 14:31:23.380110 1565 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:31:23.380178 kubelet[1565]: I1213 14:31:23.380149 1565 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:31:23.380178 kubelet[1565]: I1213 14:31:23.380179 1565 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:31:23.380346 kubelet[1565]: E1213 14:31:23.380261 1565 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:31:23.380000 audit[1597]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1597 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:23.380000 audit[1597]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffbf25d230 a2=0 a3=7fffbf25d21c items=0 ppid=1565 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:23.380000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:31:23.381000 audit[1598]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1598 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:23.381000 audit[1598]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7864ac00 a2=0 a3=7ffe7864abec items=0 ppid=1565 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:23.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:31:23.382000 audit[1599]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1599 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:23.382000 audit[1599]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdbf6c90e0 a2=0 a3=7ffdbf6c90cc items=0 ppid=1565 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:23.382000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:31:23.383000 audit[1600]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1600 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:23.383000 audit[1600]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdd1fd9130 a2=0 a3=7ffdd1fd911c items=0 ppid=1565 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:23.383000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:31:23.385000 audit[1602]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=1602 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:23.385000 audit[1602]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff28e62080 a2=0 a3=7fff28e6206c items=0 ppid=1565 pid=1602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:23.385000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:31:23.386000 audit[1601]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1601 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:23.386000 audit[1601]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1f144660 a2=0 a3=7ffe1f14464c items=0 ppid=1565 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:23.386000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:31:23.395720 kubelet[1565]: E1213 14:31:23.395682 1565 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.60\" not found" Dec 13 14:31:23.496617 kubelet[1565]: E1213 14:31:23.496552 1565 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.60\" not found" Dec 13 14:31:23.597169 kubelet[1565]: E1213 14:31:23.597096 1565 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.60\" not found" Dec 13 14:31:23.698234 kubelet[1565]: E1213 14:31:23.698093 1565 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.60\" not found" Dec 13 14:31:23.798994 kubelet[1565]: E1213 14:31:23.798927 1565 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.60\" not found" Dec 13 14:31:23.899831 kubelet[1565]: E1213 14:31:23.899758 1565 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.60\" not found" Dec 13 14:31:23.985000 audit[1447]: USER_END pid=1447 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:31:23.985000 audit[1447]: CRED_DISP pid=1447 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:31:23.985946 sudo[1447]: pam_unix(sudo:session): session closed for user root Dec 13 14:31:24.000753 kubelet[1565]: E1213 14:31:24.000685 1565 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.60\" not found" Dec 13 14:31:24.029558 sshd[1440]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:24.031000 audit[1440]: USER_END pid=1440 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:24.031000 audit[1440]: CRED_DISP pid=1440 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 14:31:24.034283 systemd[1]: sshd@6-10.128.0.60:22-139.178.68.195:56868.service: Deactivated successfully. Dec 13 14:31:24.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.60:22-139.178.68.195:56868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:24.035424 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:31:24.036315 systemd-logind[1222]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:31:24.037650 systemd-logind[1222]: Removed session 7. Dec 13 14:31:24.099548 kubelet[1565]: I1213 14:31:24.099487 1565 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:31:24.099899 kubelet[1565]: W1213 14:31:24.099876 1565 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:31:24.101697 kubelet[1565]: E1213 14:31:24.101666 1565 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.60\" not found" Dec 13 14:31:24.185691 kubelet[1565]: E1213 14:31:24.185619 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:24.202786 kubelet[1565]: E1213 14:31:24.202730 1565 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.60\" not found" Dec 13 14:31:24.303421 kubelet[1565]: E1213 14:31:24.303270 1565 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.60\" not found" Dec 13 14:31:24.404380 kubelet[1565]: E1213 14:31:24.404341 1565 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.60\" not found" Dec 13 14:31:24.504951 kubelet[1565]: E1213 14:31:24.504875 1565 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.60\" not found" Dec 13 14:31:24.605716 kubelet[1565]: E1213 14:31:24.605648 1565 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.60\" not found" Dec 13 14:31:24.706621 kubelet[1565]: E1213 14:31:24.706564 1565 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.60\" not found" Dec 13 14:31:24.807090 kubelet[1565]: E1213 14:31:24.807037 1565 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.128.0.60\" not found" Dec 13 14:31:24.908368 kubelet[1565]: I1213 14:31:24.908230 1565 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:31:24.909141 env[1231]: time="2024-12-13T14:31:24.909060589Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:31:24.909881 kubelet[1565]: I1213 14:31:24.909822 1565 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:31:25.186195 kubelet[1565]: I1213 14:31:25.186019 1565 apiserver.go:52] "Watching apiserver" Dec 13 14:31:25.186401 kubelet[1565]: E1213 14:31:25.186019 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:25.202043 kubelet[1565]: I1213 14:31:25.201986 1565 topology_manager.go:215] "Topology Admit Handler" podUID="b946f004-81fc-42a1-89e3-06cec8c892b4" podNamespace="kube-system" podName="kube-proxy-j8q28" Dec 13 14:31:25.202295 kubelet[1565]: I1213 14:31:25.202118 1565 topology_manager.go:215] "Topology Admit Handler" podUID="1748f079-9014-4649-84ed-0aa8b19201e5" podNamespace="calico-system" podName="calico-node-9ms8x" Dec 13 14:31:25.202295 kubelet[1565]: I1213 14:31:25.202218 1565 topology_manager.go:215] "Topology Admit Handler" podUID="649f0843-c817-4e51-b153-33c889fdc3bd" podNamespace="calico-system" podName="csi-node-driver-98848" Dec 13 14:31:25.202461 kubelet[1565]: E1213 14:31:25.202432 1565 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-98848" podUID="649f0843-c817-4e51-b153-33c889fdc3bd" Dec 13 14:31:25.210763 kubelet[1565]: I1213 14:31:25.209291 1565 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:31:25.209987 systemd[1]: Created slice kubepods-besteffort-pod1748f079_9014_4649_84ed_0aa8b19201e5.slice. Dec 13 14:31:25.221223 systemd[1]: Created slice kubepods-besteffort-podb946f004_81fc_42a1_89e3_06cec8c892b4.slice. Dec 13 14:31:25.224821 kubelet[1565]: I1213 14:31:25.224770 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-cni-bin-dir\") pod \"calico-node-9ms8x\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " pod="calico-system/calico-node-9ms8x" Dec 13 14:31:25.225776 kubelet[1565]: I1213 14:31:25.225724 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-cni-log-dir\") pod \"calico-node-9ms8x\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " pod="calico-system/calico-node-9ms8x" Dec 13 14:31:25.225942 kubelet[1565]: I1213 14:31:25.225827 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/649f0843-c817-4e51-b153-33c889fdc3bd-kubelet-dir\") pod \"csi-node-driver-98848\" (UID: \"649f0843-c817-4e51-b153-33c889fdc3bd\") " pod="calico-system/csi-node-driver-98848" Dec 13 14:31:25.225942 kubelet[1565]: I1213 14:31:25.225912 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zc2sm\" (UniqueName: \"kubernetes.io/projected/b946f004-81fc-42a1-89e3-06cec8c892b4-kube-api-access-zc2sm\") pod \"kube-proxy-j8q28\" (UID: \"b946f004-81fc-42a1-89e3-06cec8c892b4\") " pod="kube-system/kube-proxy-j8q28" Dec 13 14:31:25.226083 kubelet[1565]: I1213 14:31:25.225977 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-lib-modules\") pod \"calico-node-9ms8x\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " pod="calico-system/calico-node-9ms8x" Dec 13 14:31:25.226083 kubelet[1565]: I1213 14:31:25.226014 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-xtables-lock\") pod \"calico-node-9ms8x\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " pod="calico-system/calico-node-9ms8x" Dec 13 14:31:25.226193 kubelet[1565]: I1213 14:31:25.226084 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-var-lib-calico\") pod \"calico-node-9ms8x\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " pod="calico-system/calico-node-9ms8x" Dec 13 14:31:25.226193 kubelet[1565]: I1213 14:31:25.226144 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-flexvol-driver-host\") pod \"calico-node-9ms8x\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " pod="calico-system/calico-node-9ms8x" Dec 13 14:31:25.226296 kubelet[1565]: I1213 14:31:25.226181 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/649f0843-c817-4e51-b153-33c889fdc3bd-varrun\") pod \"csi-node-driver-98848\" (UID: \"649f0843-c817-4e51-b153-33c889fdc3bd\") " pod="calico-system/csi-node-driver-98848" Dec 13 14:31:25.226296 kubelet[1565]: I1213 14:31:25.226237 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/649f0843-c817-4e51-b153-33c889fdc3bd-registration-dir\") pod \"csi-node-driver-98848\" (UID: \"649f0843-c817-4e51-b153-33c889fdc3bd\") " pod="calico-system/csi-node-driver-98848" Dec 13 14:31:25.226296 kubelet[1565]: I1213 14:31:25.226291 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vwcc7\" (UniqueName: \"kubernetes.io/projected/649f0843-c817-4e51-b153-33c889fdc3bd-kube-api-access-vwcc7\") pod \"csi-node-driver-98848\" (UID: \"649f0843-c817-4e51-b153-33c889fdc3bd\") " pod="calico-system/csi-node-driver-98848" Dec 13 14:31:25.226451 kubelet[1565]: I1213 14:31:25.226326 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b946f004-81fc-42a1-89e3-06cec8c892b4-lib-modules\") pod \"kube-proxy-j8q28\" (UID: \"b946f004-81fc-42a1-89e3-06cec8c892b4\") " pod="kube-system/kube-proxy-j8q28" Dec 13 14:31:25.226451 kubelet[1565]: I1213 14:31:25.226381 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1748f079-9014-4649-84ed-0aa8b19201e5-node-certs\") pod \"calico-node-9ms8x\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " pod="calico-system/calico-node-9ms8x" Dec 13 14:31:25.226451 kubelet[1565]: I1213 14:31:25.226416 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-var-run-calico\") pod \"calico-node-9ms8x\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " pod="calico-system/calico-node-9ms8x" Dec 13 14:31:25.226605 kubelet[1565]: I1213 14:31:25.226468 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-cni-net-dir\") pod \"calico-node-9ms8x\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " pod="calico-system/calico-node-9ms8x" Dec 13 14:31:25.226605 kubelet[1565]: I1213 14:31:25.226509 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k96p2\" (UniqueName: \"kubernetes.io/projected/1748f079-9014-4649-84ed-0aa8b19201e5-kube-api-access-k96p2\") pod \"calico-node-9ms8x\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " pod="calico-system/calico-node-9ms8x" Dec 13 14:31:25.226605 kubelet[1565]: I1213 14:31:25.226562 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/649f0843-c817-4e51-b153-33c889fdc3bd-socket-dir\") pod \"csi-node-driver-98848\" (UID: \"649f0843-c817-4e51-b153-33c889fdc3bd\") " pod="calico-system/csi-node-driver-98848" Dec 13 14:31:25.226752 kubelet[1565]: I1213 14:31:25.226619 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/b946f004-81fc-42a1-89e3-06cec8c892b4-kube-proxy\") pod \"kube-proxy-j8q28\" (UID: \"b946f004-81fc-42a1-89e3-06cec8c892b4\") " pod="kube-system/kube-proxy-j8q28" Dec 13 14:31:25.226752 kubelet[1565]: I1213 14:31:25.226665 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b946f004-81fc-42a1-89e3-06cec8c892b4-xtables-lock\") pod \"kube-proxy-j8q28\" (UID: \"b946f004-81fc-42a1-89e3-06cec8c892b4\") " pod="kube-system/kube-proxy-j8q28" Dec 13 14:31:25.226752 kubelet[1565]: I1213 14:31:25.226720 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-policysync\") pod \"calico-node-9ms8x\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " pod="calico-system/calico-node-9ms8x" Dec 13 14:31:25.227032 kubelet[1565]: I1213 14:31:25.226755 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1748f079-9014-4649-84ed-0aa8b19201e5-tigera-ca-bundle\") pod \"calico-node-9ms8x\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " pod="calico-system/calico-node-9ms8x" Dec 13 14:31:25.340887 kubelet[1565]: E1213 14:31:25.340291 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:25.340887 kubelet[1565]: W1213 14:31:25.340317 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:25.340887 kubelet[1565]: E1213 14:31:25.340350 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:25.429804 kubelet[1565]: E1213 14:31:25.429772 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:25.431523 kubelet[1565]: W1213 14:31:25.431489 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:25.431775 kubelet[1565]: E1213 14:31:25.431755 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:25.438425 kubelet[1565]: E1213 14:31:25.436431 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:25.438633 kubelet[1565]: W1213 14:31:25.438604 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:25.438817 kubelet[1565]: E1213 14:31:25.438797 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:25.439361 kubelet[1565]: E1213 14:31:25.439341 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:25.439514 kubelet[1565]: W1213 14:31:25.439493 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:25.439661 kubelet[1565]: E1213 14:31:25.439643 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:25.448269 kubelet[1565]: E1213 14:31:25.448239 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:25.448269 kubelet[1565]: W1213 14:31:25.448262 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:25.448518 kubelet[1565]: E1213 14:31:25.448301 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:25.448754 kubelet[1565]: E1213 14:31:25.448731 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:25.448754 kubelet[1565]: W1213 14:31:25.448752 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:25.448953 kubelet[1565]: E1213 14:31:25.448777 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:25.520359 env[1231]: time="2024-12-13T14:31:25.520278569Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-9ms8x,Uid:1748f079-9014-4649-84ed-0aa8b19201e5,Namespace:calico-system,Attempt:0,}" Dec 13 14:31:25.525670 env[1231]: time="2024-12-13T14:31:25.525617221Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-j8q28,Uid:b946f004-81fc-42a1-89e3-06cec8c892b4,Namespace:kube-system,Attempt:0,}" Dec 13 14:31:26.070427 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2276207649.mount: Deactivated successfully. Dec 13 14:31:26.078128 env[1231]: time="2024-12-13T14:31:26.078052966Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:26.081666 env[1231]: time="2024-12-13T14:31:26.081612036Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:26.082866 env[1231]: time="2024-12-13T14:31:26.082791128Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:26.086100 env[1231]: time="2024-12-13T14:31:26.086022762Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:26.087244 env[1231]: time="2024-12-13T14:31:26.087189444Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:26.088209 env[1231]: time="2024-12-13T14:31:26.088172938Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:26.090684 env[1231]: time="2024-12-13T14:31:26.090625511Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:26.091931 env[1231]: time="2024-12-13T14:31:26.091892034Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:26.129707 env[1231]: time="2024-12-13T14:31:26.126051623Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:26.129707 env[1231]: time="2024-12-13T14:31:26.126104883Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:26.129707 env[1231]: time="2024-12-13T14:31:26.126133831Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:26.129707 env[1231]: time="2024-12-13T14:31:26.126425091Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bca4818f37e125d3e264c90293aa1f2da3038e7879c348bff346ef28e7aa2191 pid=1623 runtime=io.containerd.runc.v2 Dec 13 14:31:26.131728 env[1231]: time="2024-12-13T14:31:26.131225552Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:26.131728 env[1231]: time="2024-12-13T14:31:26.131285556Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:26.131728 env[1231]: time="2024-12-13T14:31:26.131303689Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:26.133166 env[1231]: time="2024-12-13T14:31:26.133010005Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246 pid=1637 runtime=io.containerd.runc.v2 Dec 13 14:31:26.160635 systemd[1]: Started cri-containerd-bca4818f37e125d3e264c90293aa1f2da3038e7879c348bff346ef28e7aa2191.scope. Dec 13 14:31:26.183014 systemd[1]: Started cri-containerd-8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246.scope. Dec 13 14:31:26.187310 kubelet[1565]: E1213 14:31:26.187269 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:26.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.200588 kernel: kauditd_printk_skb: 280 callbacks suppressed Dec 13 14:31:26.200676 kernel: audit: type=1400 audit(1734100286.193:451): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.286956 kernel: audit: type=1400 audit(1734100286.193:452): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.287125 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:31:26.287170 kernel: audit: type=1400 audit(1734100286.194:453): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.287210 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:31:26.287247 kernel: audit: backlog limit exceeded Dec 13 14:31:26.287289 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:31:26.287357 kernel: audit: type=1400 audit(1734100286.194:454): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.287396 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:31:26.287432 kernel: audit: backlog limit exceeded Dec 13 14:31:26.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.220000 audit: BPF prog-id=67 op=LOAD Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1623 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:26.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263613438313866333765313235643365323634633930323933616131 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1623 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:26.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263613438313866333765313235643365323634633930323933616131 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit: BPF prog-id=68 op=LOAD Dec 13 14:31:26.221000 audit[1651]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025b00 items=0 ppid=1623 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:26.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263613438313866333765313235643365323634633930323933616131 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit: BPF prog-id=69 op=LOAD Dec 13 14:31:26.221000 audit[1651]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025b48 items=0 ppid=1623 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:26.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263613438313866333765313235643365323634633930323933616131 Dec 13 14:31:26.221000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:31:26.221000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { perfmon } for pid=1651 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit[1651]: AVC avc: denied { bpf } for pid=1651 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.221000 audit: BPF prog-id=70 op=LOAD Dec 13 14:31:26.221000 audit[1651]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025f58 items=0 ppid=1623 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:26.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263613438313866333765313235643365323634633930323933616131 Dec 13 14:31:26.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.306000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.306000 audit: BPF prog-id=72 op=LOAD Dec 13 14:31:26.306000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185120 items=0 ppid=1637 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:26.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864313736383565306334383163336366313936353030656231303937 Dec 13 14:31:26.324000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.324000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.324000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.324000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.324000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.324000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.324000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.324000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.324000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.324000 audit: BPF prog-id=73 op=LOAD Dec 13 14:31:26.324000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185168 items=0 ppid=1637 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:26.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864313736383565306334383163336366313936353030656231303937 Dec 13 14:31:26.324000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:31:26.324000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:31:26.324000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.324000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.324000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.324000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.324000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.324000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.324000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.324000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.324000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.324000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:26.324000 audit: BPF prog-id=74 op=LOAD Dec 13 14:31:26.324000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000185578 items=0 ppid=1637 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:26.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864313736383565306334383163336366313936353030656231303937 Dec 13 14:31:26.362192 env[1231]: time="2024-12-13T14:31:26.361625705Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-j8q28,Uid:b946f004-81fc-42a1-89e3-06cec8c892b4,Namespace:kube-system,Attempt:0,} returns sandbox id \"bca4818f37e125d3e264c90293aa1f2da3038e7879c348bff346ef28e7aa2191\"" Dec 13 14:31:26.367187 env[1231]: time="2024-12-13T14:31:26.367134461Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-9ms8x,Uid:1748f079-9014-4649-84ed-0aa8b19201e5,Namespace:calico-system,Attempt:0,} returns sandbox id \"8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246\"" Dec 13 14:31:26.367972 env[1231]: time="2024-12-13T14:31:26.367923534Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 14:31:26.381111 kubelet[1565]: E1213 14:31:26.381055 1565 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-98848" podUID="649f0843-c817-4e51-b153-33c889fdc3bd" Dec 13 14:31:27.188149 kubelet[1565]: E1213 14:31:27.188087 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:27.591570 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3139929429.mount: Deactivated successfully. Dec 13 14:31:28.188730 kubelet[1565]: E1213 14:31:28.188656 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:28.276725 env[1231]: time="2024-12-13T14:31:28.276627928Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:28.279968 env[1231]: time="2024-12-13T14:31:28.279907886Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:28.281989 env[1231]: time="2024-12-13T14:31:28.281943040Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:28.283983 env[1231]: time="2024-12-13T14:31:28.283928368Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:28.284682 env[1231]: time="2024-12-13T14:31:28.284624706Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 14:31:28.286464 env[1231]: time="2024-12-13T14:31:28.286407730Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:31:28.288123 env[1231]: time="2024-12-13T14:31:28.288077312Z" level=info msg="CreateContainer within sandbox \"bca4818f37e125d3e264c90293aa1f2da3038e7879c348bff346ef28e7aa2191\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:31:28.311267 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1550714629.mount: Deactivated successfully. Dec 13 14:31:28.319582 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount233095476.mount: Deactivated successfully. Dec 13 14:31:28.326540 env[1231]: time="2024-12-13T14:31:28.326489497Z" level=info msg="CreateContainer within sandbox \"bca4818f37e125d3e264c90293aa1f2da3038e7879c348bff346ef28e7aa2191\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"6041ae149b238396ca861732272c179bb156dea45a26ed09e9e80d32cc2de686\"" Dec 13 14:31:28.327804 env[1231]: time="2024-12-13T14:31:28.327771422Z" level=info msg="StartContainer for \"6041ae149b238396ca861732272c179bb156dea45a26ed09e9e80d32cc2de686\"" Dec 13 14:31:28.354392 systemd[1]: Started cri-containerd-6041ae149b238396ca861732272c179bb156dea45a26ed09e9e80d32cc2de686.scope. Dec 13 14:31:28.381483 kubelet[1565]: E1213 14:31:28.381032 1565 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-98848" podUID="649f0843-c817-4e51-b153-33c889fdc3bd" Dec 13 14:31:28.384000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.384000 audit[1706]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9d14ce5458 items=0 ppid=1623 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630343161653134396232333833393663613836313733323237326331 Dec 13 14:31:28.384000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.384000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.384000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.384000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.384000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.384000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.384000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.384000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.384000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.384000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.384000 audit: BPF prog-id=75 op=LOAD Dec 13 14:31:28.384000 audit[1706]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000328878 items=0 ppid=1623 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630343161653134396232333833393663613836313733323237326331 Dec 13 14:31:28.385000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.385000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.385000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.385000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.385000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.385000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.385000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.385000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.385000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.385000 audit: BPF prog-id=76 op=LOAD Dec 13 14:31:28.385000 audit[1706]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003288c8 items=0 ppid=1623 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630343161653134396232333833393663613836313733323237326331 Dec 13 14:31:28.385000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:31:28.385000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:31:28.385000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.385000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.385000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.385000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.385000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.385000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.385000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.385000 audit[1706]: AVC avc: denied { perfmon } for pid=1706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.385000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.385000 audit[1706]: AVC avc: denied { bpf } for pid=1706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:28.385000 audit: BPF prog-id=77 op=LOAD Dec 13 14:31:28.385000 audit[1706]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000328958 items=0 ppid=1623 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630343161653134396232333833393663613836313733323237326331 Dec 13 14:31:28.409651 env[1231]: time="2024-12-13T14:31:28.409589048Z" level=info msg="StartContainer for \"6041ae149b238396ca861732272c179bb156dea45a26ed09e9e80d32cc2de686\" returns successfully" Dec 13 14:31:28.498000 audit[1756]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.498000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff35fdaab0 a2=0 a3=7fff35fdaa9c items=0 ppid=1716 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.498000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:31:28.502000 audit[1757]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.502000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff050abec0 a2=0 a3=7fff050abeac items=0 ppid=1716 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.502000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:31:28.504000 audit[1758]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.504000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe18a7f9f0 a2=0 a3=7ffe18a7f9dc items=0 ppid=1716 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.504000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:31:28.505000 audit[1759]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.505000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebbaaeda0 a2=0 a3=58cdada5cdb6b2b4 items=0 ppid=1716 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.505000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:31:28.506000 audit[1760]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.506000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2dd00be0 a2=0 a3=7ffc2dd00bcc items=0 ppid=1716 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.506000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:31:28.507000 audit[1761]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.507000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeafe72f10 a2=0 a3=7ffeafe72efc items=0 ppid=1716 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.507000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:31:28.602000 audit[1762]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.602000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc8e1a5920 a2=0 a3=7ffc8e1a590c items=0 ppid=1716 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.602000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:31:28.607000 audit[1764]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.607000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffa8f033c0 a2=0 a3=7fffa8f033ac items=0 ppid=1716 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.607000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:31:28.613000 audit[1767]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.613000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd53ee0750 a2=0 a3=7ffd53ee073c items=0 ppid=1716 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.613000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:31:28.615000 audit[1768]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.615000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2cdaa5d0 a2=0 a3=7ffc2cdaa5bc items=0 ppid=1716 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.615000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:31:28.619000 audit[1770]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.619000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe819da0e0 a2=0 a3=7ffe819da0cc items=0 ppid=1716 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.619000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:31:28.620000 audit[1771]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.620000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5c767110 a2=0 a3=7fff5c7670fc items=0 ppid=1716 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.620000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:31:28.624000 audit[1773]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.624000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc79188e10 a2=0 a3=7ffc79188dfc items=0 ppid=1716 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.624000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:31:28.630000 audit[1776]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.630000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffde3acf860 a2=0 a3=7ffde3acf84c items=0 ppid=1716 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:31:28.631000 audit[1777]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.631000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc15041ff0 a2=0 a3=7ffc15041fdc items=0 ppid=1716 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.631000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:31:28.635000 audit[1779]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.635000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd26bf990 a2=0 a3=7fffd26bf97c items=0 ppid=1716 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.635000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:31:28.638000 audit[1780]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.638000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4f23e260 a2=0 a3=7fff4f23e24c items=0 ppid=1716 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.638000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:31:28.642000 audit[1782]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.642000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc28c9c0c0 a2=0 a3=7ffc28c9c0ac items=0 ppid=1716 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.642000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:31:28.647000 audit[1785]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.647000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc47073980 a2=0 a3=7ffc4707396c items=0 ppid=1716 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.647000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:31:28.654000 audit[1788]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.654000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce1dee500 a2=0 a3=7ffce1dee4ec items=0 ppid=1716 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.654000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:31:28.655000 audit[1789]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.655000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe83479fd0 a2=0 a3=7ffe83479fbc items=0 ppid=1716 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.655000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:31:28.660000 audit[1791]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.660000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe2cc59cb0 a2=0 a3=7ffe2cc59c9c items=0 ppid=1716 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.660000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:31:28.693000 audit[1796]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.693000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcfad9a210 a2=0 a3=7ffcfad9a1fc items=0 ppid=1716 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.693000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:31:28.695000 audit[1797]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.695000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb7ac9940 a2=0 a3=7fffb7ac992c items=0 ppid=1716 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.695000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:31:28.698000 audit[1799]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:28.698000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffefa410b20 a2=0 a3=7ffefa410b0c items=0 ppid=1716 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.698000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:31:28.726000 audit[1805]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:28.726000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffbd831f60 a2=0 a3=7fffbd831f4c items=0 ppid=1716 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.726000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:28.759000 audit[1805]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:28.759000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7fffbd831f60 a2=0 a3=7fffbd831f4c items=0 ppid=1716 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.759000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:28.782000 audit[1814]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.782000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff92206280 a2=0 a3=7fff9220626c items=0 ppid=1716 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.782000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:31:28.786000 audit[1816]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.786000 audit[1816]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe6e33dc90 a2=0 a3=7ffe6e33dc7c items=0 ppid=1716 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.786000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:31:28.793000 audit[1819]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1819 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.793000 audit[1819]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe3d5a6d20 a2=0 a3=7ffe3d5a6d0c items=0 ppid=1716 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.793000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:31:28.795000 audit[1820]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.795000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc33272a80 a2=0 a3=7ffc33272a6c items=0 ppid=1716 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.795000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:31:28.799000 audit[1822]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1822 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.799000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff4655f5c0 a2=0 a3=7fff4655f5ac items=0 ppid=1716 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.799000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:31:28.801000 audit[1823]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.801000 audit[1823]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7e720f40 a2=0 a3=7fff7e720f2c items=0 ppid=1716 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.801000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:31:28.805000 audit[1825]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1825 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.805000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff066ce590 a2=0 a3=7fff066ce57c items=0 ppid=1716 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.805000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:31:28.810000 audit[1828]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.810000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcfb94d2e0 a2=0 a3=7ffcfb94d2cc items=0 ppid=1716 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.810000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:31:28.812000 audit[1829]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.812000 audit[1829]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5d14cc70 a2=0 a3=7fff5d14cc5c items=0 ppid=1716 pid=1829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.812000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:31:28.816000 audit[1831]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1831 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.816000 audit[1831]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffca4d76900 a2=0 a3=7ffca4d768ec items=0 ppid=1716 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.816000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:31:28.817000 audit[1832]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.817000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd809d100 a2=0 a3=7ffdd809d0ec items=0 ppid=1716 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.817000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:31:28.822000 audit[1834]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1834 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.822000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe056bff90 a2=0 a3=7ffe056bff7c items=0 ppid=1716 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.822000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:31:28.828000 audit[1837]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1837 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.828000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffea544a8d0 a2=0 a3=7ffea544a8bc items=0 ppid=1716 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.828000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:31:28.836000 audit[1840]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1840 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.836000 audit[1840]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcab12a3d0 a2=0 a3=7ffcab12a3bc items=0 ppid=1716 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.836000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:31:28.838000 audit[1841]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.838000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff9151f560 a2=0 a3=7fff9151f54c items=0 ppid=1716 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.838000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:31:28.843000 audit[1843]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.843000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe60ca3b50 a2=0 a3=7ffe60ca3b3c items=0 ppid=1716 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.843000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:31:28.848000 audit[1846]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1846 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.848000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdf9a38480 a2=0 a3=7ffdf9a3846c items=0 ppid=1716 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.848000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:31:28.850000 audit[1847]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.850000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec1821cd0 a2=0 a3=7ffec1821cbc items=0 ppid=1716 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.850000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:31:28.853000 audit[1849]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1849 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.853000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdb25e97a0 a2=0 a3=7ffdb25e978c items=0 ppid=1716 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.853000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:31:28.855000 audit[1850]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.855000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2bcb3660 a2=0 a3=7ffc2bcb364c items=0 ppid=1716 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.855000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:31:28.860000 audit[1852]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.860000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe79a13c40 a2=0 a3=7ffe79a13c2c items=0 ppid=1716 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.860000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:31:28.865000 audit[1855]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1855 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:31:28.865000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff52408a60 a2=0 a3=7fff52408a4c items=0 ppid=1716 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.865000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:31:28.870000 audit[1857]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1857 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:31:28.870000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc783f1530 a2=0 a3=7ffc783f151c items=0 ppid=1716 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.870000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:28.871000 audit[1857]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1857 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:31:28.871000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc783f1530 a2=0 a3=7ffc783f151c items=0 ppid=1716 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:28.871000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:29.189835 kubelet[1565]: E1213 14:31:29.189774 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:29.260089 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1815792878.mount: Deactivated successfully. Dec 13 14:31:29.408000 audit[1859]: NETFILTER_CFG table=filter:65 family=2 entries=9 op=nft_register_rule pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:29.408000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd3e5c27a0 a2=0 a3=7ffd3e5c278c items=0 ppid=1716 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:29.408000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:29.416000 audit[1859]: NETFILTER_CFG table=nat:66 family=2 entries=27 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:29.416000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd3e5c27a0 a2=0 a3=7ffd3e5c278c items=0 ppid=1716 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:29.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:29.441549 kubelet[1565]: E1213 14:31:29.441199 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.441549 kubelet[1565]: W1213 14:31:29.441232 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.441549 kubelet[1565]: E1213 14:31:29.441267 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.441802 env[1231]: time="2024-12-13T14:31:29.441278710Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:29.442742 kubelet[1565]: E1213 14:31:29.442534 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.442742 kubelet[1565]: W1213 14:31:29.442557 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.442742 kubelet[1565]: E1213 14:31:29.442589 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.443316 kubelet[1565]: E1213 14:31:29.443122 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.443316 kubelet[1565]: W1213 14:31:29.443142 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.443316 kubelet[1565]: E1213 14:31:29.443168 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.443765 kubelet[1565]: E1213 14:31:29.443589 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.443765 kubelet[1565]: W1213 14:31:29.443606 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.443765 kubelet[1565]: E1213 14:31:29.443627 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.444253 kubelet[1565]: E1213 14:31:29.444094 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.444253 kubelet[1565]: W1213 14:31:29.444110 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.444253 kubelet[1565]: E1213 14:31:29.444131 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.444670 kubelet[1565]: E1213 14:31:29.444512 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.444670 kubelet[1565]: W1213 14:31:29.444529 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.444670 kubelet[1565]: E1213 14:31:29.444548 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.445136 kubelet[1565]: E1213 14:31:29.444977 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.445136 kubelet[1565]: W1213 14:31:29.444994 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.445136 kubelet[1565]: E1213 14:31:29.445014 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.445565 kubelet[1565]: E1213 14:31:29.445393 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.445565 kubelet[1565]: W1213 14:31:29.445411 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.445565 kubelet[1565]: E1213 14:31:29.445431 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.445861 kubelet[1565]: E1213 14:31:29.445833 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.445981 kubelet[1565]: W1213 14:31:29.445964 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.446082 kubelet[1565]: E1213 14:31:29.446067 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.446481 kubelet[1565]: E1213 14:31:29.446462 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.446602 kubelet[1565]: W1213 14:31:29.446583 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.446726 kubelet[1565]: E1213 14:31:29.446710 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.447187 kubelet[1565]: E1213 14:31:29.447168 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.447322 kubelet[1565]: W1213 14:31:29.447304 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.447437 kubelet[1565]: E1213 14:31:29.447413 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.447961 kubelet[1565]: E1213 14:31:29.447933 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.447961 kubelet[1565]: W1213 14:31:29.447955 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.448139 kubelet[1565]: E1213 14:31:29.447975 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.448427 env[1231]: time="2024-12-13T14:31:29.448386855Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:29.449016 kubelet[1565]: E1213 14:31:29.448994 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.449016 kubelet[1565]: W1213 14:31:29.449016 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.449180 kubelet[1565]: E1213 14:31:29.449036 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.449478 kubelet[1565]: E1213 14:31:29.449457 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.449478 kubelet[1565]: W1213 14:31:29.449477 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.449665 kubelet[1565]: E1213 14:31:29.449498 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.449937 kubelet[1565]: E1213 14:31:29.449915 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.449937 kubelet[1565]: W1213 14:31:29.449937 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.450146 kubelet[1565]: E1213 14:31:29.449958 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.450446 kubelet[1565]: E1213 14:31:29.450413 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.450446 kubelet[1565]: W1213 14:31:29.450434 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.450602 kubelet[1565]: E1213 14:31:29.450457 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.450942 kubelet[1565]: E1213 14:31:29.450915 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.450942 kubelet[1565]: W1213 14:31:29.450936 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.451096 kubelet[1565]: E1213 14:31:29.450957 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.451355 kubelet[1565]: E1213 14:31:29.451335 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.451355 kubelet[1565]: W1213 14:31:29.451355 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.451503 kubelet[1565]: E1213 14:31:29.451386 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.451770 kubelet[1565]: E1213 14:31:29.451750 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.451770 kubelet[1565]: W1213 14:31:29.451769 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.451943 kubelet[1565]: E1213 14:31:29.451789 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.452206 kubelet[1565]: E1213 14:31:29.452186 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.452206 kubelet[1565]: W1213 14:31:29.452206 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.452346 kubelet[1565]: E1213 14:31:29.452226 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.453206 env[1231]: time="2024-12-13T14:31:29.453167803Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:29.455641 env[1231]: time="2024-12-13T14:31:29.455589462Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:29.456622 env[1231]: time="2024-12-13T14:31:29.456575443Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:31:29.459425 env[1231]: time="2024-12-13T14:31:29.459366616Z" level=info msg="CreateContainer within sandbox \"8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:31:29.479974 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount941422997.mount: Deactivated successfully. Dec 13 14:31:29.487881 env[1231]: time="2024-12-13T14:31:29.487805459Z" level=info msg="CreateContainer within sandbox \"8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e\"" Dec 13 14:31:29.488779 env[1231]: time="2024-12-13T14:31:29.488735364Z" level=info msg="StartContainer for \"3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e\"" Dec 13 14:31:29.507093 kubelet[1565]: E1213 14:31:29.507052 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.507093 kubelet[1565]: W1213 14:31:29.507082 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.507093 kubelet[1565]: E1213 14:31:29.507114 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.507560 kubelet[1565]: E1213 14:31:29.507535 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.507560 kubelet[1565]: W1213 14:31:29.507553 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.507721 kubelet[1565]: E1213 14:31:29.507580 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.508046 kubelet[1565]: E1213 14:31:29.508015 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.508046 kubelet[1565]: W1213 14:31:29.508035 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.508229 kubelet[1565]: E1213 14:31:29.508063 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.508616 kubelet[1565]: E1213 14:31:29.508585 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.508616 kubelet[1565]: W1213 14:31:29.508605 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.508785 kubelet[1565]: E1213 14:31:29.508631 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.509142 kubelet[1565]: E1213 14:31:29.509107 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.509142 kubelet[1565]: W1213 14:31:29.509129 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.509297 kubelet[1565]: E1213 14:31:29.509263 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.509554 kubelet[1565]: E1213 14:31:29.509517 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.509554 kubelet[1565]: W1213 14:31:29.509535 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.509714 kubelet[1565]: E1213 14:31:29.509559 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.509913 kubelet[1565]: E1213 14:31:29.509892 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.509913 kubelet[1565]: W1213 14:31:29.509912 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.510080 kubelet[1565]: E1213 14:31:29.509935 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.510256 kubelet[1565]: E1213 14:31:29.510235 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.510365 kubelet[1565]: W1213 14:31:29.510257 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.510365 kubelet[1565]: E1213 14:31:29.510281 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.510635 kubelet[1565]: E1213 14:31:29.510617 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.510635 kubelet[1565]: W1213 14:31:29.510635 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.510790 kubelet[1565]: E1213 14:31:29.510773 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.511311 kubelet[1565]: E1213 14:31:29.511278 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.511311 kubelet[1565]: W1213 14:31:29.511298 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.511462 kubelet[1565]: E1213 14:31:29.511323 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.511918 kubelet[1565]: E1213 14:31:29.511897 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.511918 kubelet[1565]: W1213 14:31:29.511918 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.512113 kubelet[1565]: E1213 14:31:29.511944 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.512272 kubelet[1565]: E1213 14:31:29.512239 1565 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:31:29.512272 kubelet[1565]: W1213 14:31:29.512259 1565 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:31:29.512402 kubelet[1565]: E1213 14:31:29.512278 1565 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:31:29.518749 systemd[1]: Started cri-containerd-3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e.scope. Dec 13 14:31:29.541000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.541000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7f977881d018 items=0 ppid=1637 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:29.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338343062623037653338333739383165663530363261346463323033 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit: BPF prog-id=78 op=LOAD Dec 13 14:31:29.542000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c000388888 items=0 ppid=1637 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:29.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338343062623037653338333739383165663530363261346463323033 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit: BPF prog-id=79 op=LOAD Dec 13 14:31:29.542000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c0003888d8 items=0 ppid=1637 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:29.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338343062623037653338333739383165663530363261346463323033 Dec 13 14:31:29.542000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:31:29.542000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:29.542000 audit: BPF prog-id=80 op=LOAD Dec 13 14:31:29.542000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c000388968 items=0 ppid=1637 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:29.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338343062623037653338333739383165663530363261346463323033 Dec 13 14:31:29.563984 env[1231]: time="2024-12-13T14:31:29.563607481Z" level=info msg="StartContainer for \"3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e\" returns successfully" Dec 13 14:31:29.579814 systemd[1]: cri-containerd-3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e.scope: Deactivated successfully. Dec 13 14:31:29.580000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:31:29.619593 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e-rootfs.mount: Deactivated successfully. Dec 13 14:31:29.992997 env[1231]: time="2024-12-13T14:31:29.992818171Z" level=info msg="shim disconnected" id=3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e Dec 13 14:31:29.992997 env[1231]: time="2024-12-13T14:31:29.992999914Z" level=warning msg="cleaning up after shim disconnected" id=3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e namespace=k8s.io Dec 13 14:31:29.993393 env[1231]: time="2024-12-13T14:31:29.993014812Z" level=info msg="cleaning up dead shim" Dec 13 14:31:30.005398 env[1231]: time="2024-12-13T14:31:30.005340241Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1940 runtime=io.containerd.runc.v2\n" Dec 13 14:31:30.190382 kubelet[1565]: E1213 14:31:30.190299 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:30.381135 kubelet[1565]: E1213 14:31:30.381069 1565 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-98848" podUID="649f0843-c817-4e51-b153-33c889fdc3bd" Dec 13 14:31:30.421926 env[1231]: time="2024-12-13T14:31:30.421874578Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:31:30.463708 kubelet[1565]: I1213 14:31:30.463651 1565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-j8q28" podStartSLOduration=5.542704323 podStartE2EDuration="7.463575937s" podCreationTimestamp="2024-12-13 14:31:23 +0000 UTC" firstStartedPulling="2024-12-13 14:31:26.36435052 +0000 UTC m=+4.000120243" lastFinishedPulling="2024-12-13 14:31:28.285222129 +0000 UTC m=+5.920991857" observedRunningTime="2024-12-13 14:31:29.437388271 +0000 UTC m=+7.073158008" watchObservedRunningTime="2024-12-13 14:31:30.463575937 +0000 UTC m=+8.099345670" Dec 13 14:31:31.190750 kubelet[1565]: E1213 14:31:31.190699 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:32.191886 kubelet[1565]: E1213 14:31:32.191770 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:32.381880 kubelet[1565]: E1213 14:31:32.381263 1565 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-98848" podUID="649f0843-c817-4e51-b153-33c889fdc3bd" Dec 13 14:31:32.754000 audit[1958]: NETFILTER_CFG table=filter:67 family=2 entries=8 op=nft_register_rule pid=1958 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:32.777401 kernel: kauditd_printk_skb: 376 callbacks suppressed Dec 13 14:31:32.777583 kernel: audit: type=1325 audit(1734100292.754:547): table=filter:67 family=2 entries=8 op=nft_register_rule pid=1958 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:32.810527 kernel: audit: type=1300 audit(1734100292.754:547): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd41737bb0 a2=0 a3=7ffd41737b9c items=0 ppid=1716 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:32.754000 audit[1958]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd41737bb0 a2=0 a3=7ffd41737b9c items=0 ppid=1716 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:32.754000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:32.842566 kernel: audit: type=1327 audit(1734100292.754:547): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:32.842720 kernel: audit: type=1325 audit(1734100292.810:548): table=nat:68 family=2 entries=34 op=nft_register_chain pid=1958 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:32.810000 audit[1958]: NETFILTER_CFG table=nat:68 family=2 entries=34 op=nft_register_chain pid=1958 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:32.810000 audit[1958]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd41737bb0 a2=0 a3=7ffd41737b9c items=0 ppid=1716 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:32.810000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:32.891542 kernel: audit: type=1300 audit(1734100292.810:548): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd41737bb0 a2=0 a3=7ffd41737b9c items=0 ppid=1716 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:32.891681 kernel: audit: type=1327 audit(1734100292.810:548): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:33.192294 kubelet[1565]: E1213 14:31:33.192215 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:34.192882 kubelet[1565]: E1213 14:31:34.192820 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:34.381872 kubelet[1565]: E1213 14:31:34.381304 1565 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-98848" podUID="649f0843-c817-4e51-b153-33c889fdc3bd" Dec 13 14:31:34.604204 env[1231]: time="2024-12-13T14:31:34.604133480Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:34.606719 env[1231]: time="2024-12-13T14:31:34.606665316Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:34.609086 env[1231]: time="2024-12-13T14:31:34.609034739Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:34.611361 env[1231]: time="2024-12-13T14:31:34.611312214Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:34.612249 env[1231]: time="2024-12-13T14:31:34.612190411Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:31:34.615626 env[1231]: time="2024-12-13T14:31:34.615574041Z" level=info msg="CreateContainer within sandbox \"8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:31:34.636661 env[1231]: time="2024-12-13T14:31:34.636595162Z" level=info msg="CreateContainer within sandbox \"8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23\"" Dec 13 14:31:34.637610 env[1231]: time="2024-12-13T14:31:34.637552056Z" level=info msg="StartContainer for \"0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23\"" Dec 13 14:31:34.678198 systemd[1]: run-containerd-runc-k8s.io-0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23-runc.g5No9X.mount: Deactivated successfully. Dec 13 14:31:34.684198 systemd[1]: Started cri-containerd-0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23.scope. Dec 13 14:31:34.703000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.726156 kernel: audit: type=1400 audit(1734100294.703:549): avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.703000 audit[1967]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff23eda64f8 items=0 ppid=1637 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:34.787681 kernel: audit: type=1300 audit(1734100294.703:549): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff23eda64f8 items=0 ppid=1637 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:34.787887 kernel: audit: type=1327 audit(1734100294.703:549): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313565383231656262666565633762616566366138306232386361 Dec 13 14:31:34.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313565383231656262666565633762616566366138306232386361 Dec 13 14:31:34.703000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.703000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.808885 kernel: audit: type=1400 audit(1734100294.703:550): avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.703000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.703000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.703000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.703000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.703000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.703000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.703000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.703000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.703000 audit: BPF prog-id=81 op=LOAD Dec 13 14:31:34.703000 audit[1967]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002b7ed8 items=0 ppid=1637 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:34.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313565383231656262666565633762616566366138306232386361 Dec 13 14:31:34.724000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.724000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.724000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.724000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.724000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.724000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.724000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.724000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.724000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.724000 audit: BPF prog-id=82 op=LOAD Dec 13 14:31:34.724000 audit[1967]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002b7f28 items=0 ppid=1637 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:34.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313565383231656262666565633762616566366138306232386361 Dec 13 14:31:34.725000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:31:34.725000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:31:34.725000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.725000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.725000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.725000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.725000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.725000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.725000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.725000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.725000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.725000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:34.725000 audit: BPF prog-id=83 op=LOAD Dec 13 14:31:34.725000 audit[1967]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002b7fb8 items=0 ppid=1637 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:34.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065313565383231656262666565633762616566366138306232386361 Dec 13 14:31:34.831394 env[1231]: time="2024-12-13T14:31:34.831331035Z" level=info msg="StartContainer for \"0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23\" returns successfully" Dec 13 14:31:35.193358 kubelet[1565]: E1213 14:31:35.193280 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:35.717671 env[1231]: time="2024-12-13T14:31:35.717570746Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:31:35.720128 kubelet[1565]: I1213 14:31:35.720098 1565 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:31:35.722131 systemd[1]: cri-containerd-0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23.scope: Deactivated successfully. Dec 13 14:31:35.725000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:31:35.753522 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23-rootfs.mount: Deactivated successfully. Dec 13 14:31:36.194598 kubelet[1565]: E1213 14:31:36.194529 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:36.386880 systemd[1]: Created slice kubepods-besteffort-pod649f0843_c817_4e51_b153_33c889fdc3bd.slice. Dec 13 14:31:36.390754 env[1231]: time="2024-12-13T14:31:36.390699753Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-98848,Uid:649f0843-c817-4e51-b153-33c889fdc3bd,Namespace:calico-system,Attempt:0,}" Dec 13 14:31:36.523068 env[1231]: time="2024-12-13T14:31:36.522465890Z" level=info msg="shim disconnected" id=0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23 Dec 13 14:31:36.523068 env[1231]: time="2024-12-13T14:31:36.522530508Z" level=warning msg="cleaning up after shim disconnected" id=0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23 namespace=k8s.io Dec 13 14:31:36.523068 env[1231]: time="2024-12-13T14:31:36.522545887Z" level=info msg="cleaning up dead shim" Dec 13 14:31:36.550583 env[1231]: time="2024-12-13T14:31:36.550526692Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2005 runtime=io.containerd.runc.v2\n" Dec 13 14:31:36.614748 env[1231]: time="2024-12-13T14:31:36.614649027Z" level=error msg="Failed to destroy network for sandbox \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:36.620429 env[1231]: time="2024-12-13T14:31:36.616240536Z" level=error msg="encountered an error cleaning up failed sandbox \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:36.620429 env[1231]: time="2024-12-13T14:31:36.616335007Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-98848,Uid:649f0843-c817-4e51-b153-33c889fdc3bd,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:36.618529 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4-shm.mount: Deactivated successfully. Dec 13 14:31:36.620816 kubelet[1565]: E1213 14:31:36.616787 1565 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:36.620816 kubelet[1565]: E1213 14:31:36.616896 1565 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-98848" Dec 13 14:31:36.620816 kubelet[1565]: E1213 14:31:36.616964 1565 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-98848" Dec 13 14:31:36.621030 kubelet[1565]: E1213 14:31:36.617079 1565 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-98848_calico-system(649f0843-c817-4e51-b153-33c889fdc3bd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-98848_calico-system(649f0843-c817-4e51-b153-33c889fdc3bd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-98848" podUID="649f0843-c817-4e51-b153-33c889fdc3bd" Dec 13 14:31:37.133771 kubelet[1565]: I1213 14:31:37.133717 1565 topology_manager.go:215] "Topology Admit Handler" podUID="363c0ec2-9beb-4b91-969b-f550c1641f47" podNamespace="default" podName="nginx-deployment-6d5f899847-sfg5f" Dec 13 14:31:37.140963 systemd[1]: Created slice kubepods-besteffort-pod363c0ec2_9beb_4b91_969b_f550c1641f47.slice. Dec 13 14:31:37.194806 kubelet[1565]: E1213 14:31:37.194733 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:37.274359 kubelet[1565]: I1213 14:31:37.274295 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2gxvk\" (UniqueName: \"kubernetes.io/projected/363c0ec2-9beb-4b91-969b-f550c1641f47-kube-api-access-2gxvk\") pod \"nginx-deployment-6d5f899847-sfg5f\" (UID: \"363c0ec2-9beb-4b91-969b-f550c1641f47\") " pod="default/nginx-deployment-6d5f899847-sfg5f" Dec 13 14:31:37.446641 env[1231]: time="2024-12-13T14:31:37.446477162Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-sfg5f,Uid:363c0ec2-9beb-4b91-969b-f550c1641f47,Namespace:default,Attempt:0,}" Dec 13 14:31:37.449035 env[1231]: time="2024-12-13T14:31:37.448900000Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:31:37.450352 kubelet[1565]: I1213 14:31:37.450321 1565 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Dec 13 14:31:37.451876 env[1231]: time="2024-12-13T14:31:37.451804161Z" level=info msg="StopPodSandbox for \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\"" Dec 13 14:31:37.525968 env[1231]: time="2024-12-13T14:31:37.525887878Z" level=error msg="StopPodSandbox for \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\" failed" error="failed to destroy network for sandbox \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:37.526976 kubelet[1565]: E1213 14:31:37.526596 1565 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Dec 13 14:31:37.526976 kubelet[1565]: E1213 14:31:37.526735 1565 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4"} Dec 13 14:31:37.526976 kubelet[1565]: E1213 14:31:37.526815 1565 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"649f0843-c817-4e51-b153-33c889fdc3bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:37.526976 kubelet[1565]: E1213 14:31:37.526895 1565 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"649f0843-c817-4e51-b153-33c889fdc3bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-98848" podUID="649f0843-c817-4e51-b153-33c889fdc3bd" Dec 13 14:31:37.565872 env[1231]: time="2024-12-13T14:31:37.565684698Z" level=error msg="Failed to destroy network for sandbox \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:37.570431 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f-shm.mount: Deactivated successfully. Dec 13 14:31:37.572874 env[1231]: time="2024-12-13T14:31:37.572784609Z" level=error msg="encountered an error cleaning up failed sandbox \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:37.573058 env[1231]: time="2024-12-13T14:31:37.572903941Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-sfg5f,Uid:363c0ec2-9beb-4b91-969b-f550c1641f47,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:37.573330 kubelet[1565]: E1213 14:31:37.573284 1565 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:37.573448 kubelet[1565]: E1213 14:31:37.573360 1565 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-sfg5f" Dec 13 14:31:37.573448 kubelet[1565]: E1213 14:31:37.573394 1565 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-sfg5f" Dec 13 14:31:37.573562 kubelet[1565]: E1213 14:31:37.573475 1565 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-sfg5f_default(363c0ec2-9beb-4b91-969b-f550c1641f47)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-sfg5f_default(363c0ec2-9beb-4b91-969b-f550c1641f47)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-sfg5f" podUID="363c0ec2-9beb-4b91-969b-f550c1641f47" Dec 13 14:31:37.670255 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 14:31:37.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:37.690000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:31:37.690000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:31:37.690000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:31:38.195579 kubelet[1565]: E1213 14:31:38.195501 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:38.453769 kubelet[1565]: I1213 14:31:38.453461 1565 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Dec 13 14:31:38.454523 env[1231]: time="2024-12-13T14:31:38.454458475Z" level=info msg="StopPodSandbox for \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\"" Dec 13 14:31:38.536557 env[1231]: time="2024-12-13T14:31:38.536452269Z" level=error msg="StopPodSandbox for \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\" failed" error="failed to destroy network for sandbox \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:31:38.537156 kubelet[1565]: E1213 14:31:38.537103 1565 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Dec 13 14:31:38.537299 kubelet[1565]: E1213 14:31:38.537272 1565 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f"} Dec 13 14:31:38.537448 kubelet[1565]: E1213 14:31:38.537425 1565 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"363c0ec2-9beb-4b91-969b-f550c1641f47\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:31:38.537596 kubelet[1565]: E1213 14:31:38.537523 1565 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"363c0ec2-9beb-4b91-969b-f550c1641f47\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-sfg5f" podUID="363c0ec2-9beb-4b91-969b-f550c1641f47" Dec 13 14:31:39.196419 kubelet[1565]: E1213 14:31:39.196344 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:40.197341 kubelet[1565]: E1213 14:31:40.197238 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:41.198067 kubelet[1565]: E1213 14:31:41.197981 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:42.199023 kubelet[1565]: E1213 14:31:42.198914 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:43.172768 kubelet[1565]: E1213 14:31:43.172694 1565 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:43.200043 kubelet[1565]: E1213 14:31:43.199951 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:44.200762 kubelet[1565]: E1213 14:31:44.200668 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:44.321149 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3835008784.mount: Deactivated successfully. Dec 13 14:31:44.365868 env[1231]: time="2024-12-13T14:31:44.365781093Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:44.368619 env[1231]: time="2024-12-13T14:31:44.368559846Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:44.370973 env[1231]: time="2024-12-13T14:31:44.370928318Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:44.373212 env[1231]: time="2024-12-13T14:31:44.373168151Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:44.373969 env[1231]: time="2024-12-13T14:31:44.373923127Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:31:44.397693 env[1231]: time="2024-12-13T14:31:44.397636580Z" level=info msg="CreateContainer within sandbox \"8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:31:44.419832 env[1231]: time="2024-12-13T14:31:44.419740172Z" level=info msg="CreateContainer within sandbox \"8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2\"" Dec 13 14:31:44.420506 env[1231]: time="2024-12-13T14:31:44.420460241Z" level=info msg="StartContainer for \"efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2\"" Dec 13 14:31:44.447226 systemd[1]: Started cri-containerd-efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2.scope. Dec 13 14:31:44.505386 kernel: kauditd_printk_skb: 44 callbacks suppressed Dec 13 14:31:44.505585 kernel: audit: type=1400 audit(1734100304.478:560): avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.478000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.478000 audit[2135]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f56087dec48 items=0 ppid=1637 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:44.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566633662666663626232366337633466336535303234376435363336 Dec 13 14:31:44.568500 kernel: audit: type=1300 audit(1734100304.478:560): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f56087dec48 items=0 ppid=1637 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:44.568812 kernel: audit: type=1327 audit(1734100304.478:560): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566633662666663626232366337633466336535303234376435363336 Dec 13 14:31:44.588797 kernel: audit: type=1400 audit(1734100304.478:561): avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.478000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.478000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.478000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.631028 kernel: audit: type=1400 audit(1734100304.478:561): avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.631178 kernel: audit: type=1400 audit(1734100304.478:561): avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.631218 kernel: audit: type=1400 audit(1734100304.478:561): avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.478000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.478000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.667218 env[1231]: time="2024-12-13T14:31:44.667152264Z" level=info msg="StartContainer for \"efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2\" returns successfully" Dec 13 14:31:44.478000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.693259 kernel: audit: type=1400 audit(1734100304.478:561): avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.693422 kernel: audit: type=1400 audit(1734100304.478:561): avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.693469 kernel: audit: type=1400 audit(1734100304.478:561): avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.478000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.478000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.478000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.478000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.478000 audit: BPF prog-id=84 op=LOAD Dec 13 14:31:44.478000 audit[2135]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003929d8 items=0 ppid=1637 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:44.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566633662666663626232366337633466336535303234376435363336 Dec 13 14:31:44.505000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.505000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.505000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.505000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.505000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.505000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.505000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.505000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.505000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.505000 audit: BPF prog-id=85 op=LOAD Dec 13 14:31:44.505000 audit[2135]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000392a28 items=0 ppid=1637 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:44.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566633662666663626232366337633466336535303234376435363336 Dec 13 14:31:44.505000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:31:44.505000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:31:44.505000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.505000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.505000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.505000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.505000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.505000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.505000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.505000 audit[2135]: AVC avc: denied { perfmon } for pid=2135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.505000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.505000 audit[2135]: AVC avc: denied { bpf } for pid=2135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:44.505000 audit: BPF prog-id=86 op=LOAD Dec 13 14:31:44.505000 audit[2135]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000392ab8 items=0 ppid=1637 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:44.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566633662666663626232366337633466336535303234376435363336 Dec 13 14:31:44.776050 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:31:44.776247 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:31:45.201319 kubelet[1565]: E1213 14:31:45.201246 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:45.491705 kubelet[1565]: I1213 14:31:45.491548 1565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-9ms8x" podStartSLOduration=4.486399347 podStartE2EDuration="22.491497375s" podCreationTimestamp="2024-12-13 14:31:23 +0000 UTC" firstStartedPulling="2024-12-13 14:31:26.36928077 +0000 UTC m=+4.005050491" lastFinishedPulling="2024-12-13 14:31:44.37437879 +0000 UTC m=+22.010148519" observedRunningTime="2024-12-13 14:31:45.491308429 +0000 UTC m=+23.127078164" watchObservedRunningTime="2024-12-13 14:31:45.491497375 +0000 UTC m=+23.127267110" Dec 13 14:31:46.127000 audit[2240]: AVC avc: denied { write } for pid=2240 comm="tee" name="fd" dev="proc" ino=19634 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:46.138000 audit[2254]: AVC avc: denied { write } for pid=2254 comm="tee" name="fd" dev="proc" ino=19642 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:46.139000 audit[2251]: AVC avc: denied { write } for pid=2251 comm="tee" name="fd" dev="proc" ino=19397 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:46.139000 audit[2251]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5bccd9f3 a2=241 a3=1b6 items=1 ppid=2199 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.139000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:31:46.139000 audit: PATH item=0 name="/dev/fd/63" inode=19392 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:46.139000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:46.127000 audit[2240]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe963dd9f3 a2=241 a3=1b6 items=1 ppid=2200 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.127000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:31:46.127000 audit: PATH item=0 name="/dev/fd/63" inode=19630 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:46.127000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:46.147000 audit[2263]: AVC avc: denied { write } for pid=2263 comm="tee" name="fd" dev="proc" ino=19401 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:46.147000 audit[2263]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff64f169f3 a2=241 a3=1b6 items=1 ppid=2209 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.147000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:31:46.147000 audit: PATH item=0 name="/dev/fd/63" inode=19639 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:46.147000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:46.149000 audit[2249]: AVC avc: denied { write } for pid=2249 comm="tee" name="fd" dev="proc" ino=19405 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:46.149000 audit[2249]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1b5a79f4 a2=241 a3=1b6 items=1 ppid=2203 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.149000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:31:46.149000 audit: PATH item=0 name="/dev/fd/63" inode=19391 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:46.149000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:46.154000 audit[2258]: AVC avc: denied { write } for pid=2258 comm="tee" name="fd" dev="proc" ino=19410 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:46.154000 audit[2258]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff62ef99e3 a2=241 a3=1b6 items=1 ppid=2210 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.154000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:31:46.154000 audit: PATH item=0 name="/dev/fd/63" inode=19637 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:46.154000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:46.138000 audit[2254]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde5ff99e4 a2=241 a3=1b6 items=1 ppid=2204 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.138000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:31:46.138000 audit: PATH item=0 name="/dev/fd/63" inode=19393 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:46.138000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:46.176000 audit[2273]: AVC avc: denied { write } for pid=2273 comm="tee" name="fd" dev="proc" ino=19651 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:31:46.176000 audit[2273]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff816a19f5 a2=241 a3=1b6 items=1 ppid=2219 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.176000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:31:46.176000 audit: PATH item=0 name="/dev/fd/63" inode=19647 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:46.176000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:31:46.202206 kubelet[1565]: E1213 14:31:46.202144 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:46.407000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.407000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.407000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.407000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.407000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.407000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.407000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.407000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.407000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.407000 audit: BPF prog-id=87 op=LOAD Dec 13 14:31:46.407000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff32ffc80 a2=98 a3=3 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.407000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.407000 audit: BPF prog-id=87 op=UNLOAD Dec 13 14:31:46.409000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.409000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.409000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.409000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.409000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.409000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.409000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.409000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.409000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.409000 audit: BPF prog-id=88 op=LOAD Dec 13 14:31:46.409000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffff32ffa60 a2=74 a3=540051 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.409000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.409000 audit: BPF prog-id=88 op=UNLOAD Dec 13 14:31:46.409000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.409000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.409000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.409000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.409000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.409000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.409000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.409000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.409000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.409000 audit: BPF prog-id=89 op=LOAD Dec 13 14:31:46.409000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffff32ffa90 a2=94 a3=2 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.409000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.409000 audit: BPF prog-id=89 op=UNLOAD Dec 13 14:31:46.530000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.530000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.530000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.530000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.530000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.530000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.530000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.530000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.530000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.530000 audit: BPF prog-id=90 op=LOAD Dec 13 14:31:46.530000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffff32ff950 a2=40 a3=1 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.530000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.531000 audit: BPF prog-id=90 op=UNLOAD Dec 13 14:31:46.531000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.531000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffff32ffa20 a2=50 a3=7ffff32ffb00 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.531000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff32ff960 a2=28 a3=0 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.543000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff32ff990 a2=28 a3=0 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.543000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff32ff8a0 a2=28 a3=0 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.543000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff32ff9b0 a2=28 a3=0 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.543000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff32ff990 a2=28 a3=0 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.543000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff32ff980 a2=28 a3=0 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.543000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff32ff9b0 a2=28 a3=0 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.543000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff32ff990 a2=28 a3=0 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.543000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff32ff9b0 a2=28 a3=0 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.543000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff32ff980 a2=28 a3=0 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.543000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffff32ff9f0 a2=28 a3=0 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.543000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffff32ff7a0 a2=50 a3=1 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.543000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit: BPF prog-id=91 op=LOAD Dec 13 14:31:46.543000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffff32ff7a0 a2=94 a3=5 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.543000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.543000 audit: BPF prog-id=91 op=UNLOAD Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffff32ff850 a2=50 a3=1 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.543000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffff32ff970 a2=4 a3=38 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.543000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.543000 audit[2311]: AVC avc: denied { confidentiality } for pid=2311 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:46.543000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffff32ff9c0 a2=94 a3=6 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.543000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { confidentiality } for pid=2311 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:46.544000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffff32ff170 a2=94 a3=83 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.544000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { perfmon } for pid=2311 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { bpf } for pid=2311 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.544000 audit[2311]: AVC avc: denied { confidentiality } for pid=2311 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:46.544000 audit[2311]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffff32ff170 a2=94 a3=83 items=0 ppid=2201 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.544000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit: BPF prog-id=92 op=LOAD Dec 13 14:31:46.557000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdfaa656e0 a2=98 a3=1999999999999999 items=0 ppid=2201 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.557000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:31:46.557000 audit: BPF prog-id=92 op=UNLOAD Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit: BPF prog-id=93 op=LOAD Dec 13 14:31:46.557000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdfaa655c0 a2=74 a3=ffff items=0 ppid=2201 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.557000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:31:46.557000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.557000 audit: BPF prog-id=94 op=LOAD Dec 13 14:31:46.557000 audit[2314]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdfaa65600 a2=40 a3=7ffdfaa657e0 items=0 ppid=2201 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.557000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:31:46.557000 audit: BPF prog-id=94 op=UNLOAD Dec 13 14:31:46.651231 systemd-networkd[1035]: vxlan.calico: Link UP Dec 13 14:31:46.651249 systemd-networkd[1035]: vxlan.calico: Gained carrier Dec 13 14:31:46.691000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.691000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.691000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.691000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.691000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.691000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.691000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.691000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.691000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.691000 audit: BPF prog-id=95 op=LOAD Dec 13 14:31:46.691000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff619f6f00 a2=98 a3=ffffffff items=0 ppid=2201 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.691000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:46.693000 audit: BPF prog-id=95 op=UNLOAD Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit: BPF prog-id=96 op=LOAD Dec 13 14:31:46.693000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff619f6d10 a2=74 a3=540051 items=0 ppid=2201 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.693000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:46.693000 audit: BPF prog-id=96 op=UNLOAD Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit: BPF prog-id=97 op=LOAD Dec 13 14:31:46.693000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff619f6d40 a2=94 a3=2 items=0 ppid=2201 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.693000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:46.693000 audit: BPF prog-id=97 op=UNLOAD Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff619f6c10 a2=28 a3=0 items=0 ppid=2201 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.693000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff619f6c40 a2=28 a3=0 items=0 ppid=2201 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.693000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff619f6b50 a2=28 a3=0 items=0 ppid=2201 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.693000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff619f6c60 a2=28 a3=0 items=0 ppid=2201 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.693000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff619f6c40 a2=28 a3=0 items=0 ppid=2201 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.693000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff619f6c30 a2=28 a3=0 items=0 ppid=2201 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.693000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff619f6c60 a2=28 a3=0 items=0 ppid=2201 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.693000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff619f6c40 a2=28 a3=0 items=0 ppid=2201 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.693000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:46.693000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.693000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff619f6c60 a2=28 a3=0 items=0 ppid=2201 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.693000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:46.694000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.694000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff619f6c30 a2=28 a3=0 items=0 ppid=2201 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.694000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:46.694000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.694000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff619f6ca0 a2=28 a3=0 items=0 ppid=2201 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.694000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:46.694000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.694000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.694000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.694000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.694000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.694000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.694000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.694000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.694000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.694000 audit: BPF prog-id=98 op=LOAD Dec 13 14:31:46.694000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff619f6b10 a2=40 a3=0 items=0 ppid=2201 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.694000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:46.694000 audit: BPF prog-id=98 op=UNLOAD Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff619f6b00 a2=50 a3=2800 items=0 ppid=2201 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff619f6b00 a2=50 a3=2800 items=0 ppid=2201 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit: BPF prog-id=99 op=LOAD Dec 13 14:31:46.697000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff619f6320 a2=94 a3=2 items=0 ppid=2201 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:46.697000 audit: BPF prog-id=99 op=UNLOAD Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { perfmon } for pid=2344 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit[2344]: AVC avc: denied { bpf } for pid=2344 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.697000 audit: BPF prog-id=100 op=LOAD Dec 13 14:31:46.697000 audit[2344]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff619f6420 a2=94 a3=2d items=0 ppid=2201 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.697000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit: BPF prog-id=101 op=LOAD Dec 13 14:31:46.707000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd6fbd6a20 a2=98 a3=0 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.707000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.707000 audit: BPF prog-id=101 op=UNLOAD Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit: BPF prog-id=102 op=LOAD Dec 13 14:31:46.707000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6fbd6800 a2=74 a3=540051 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.707000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.707000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.707000 audit: BPF prog-id=103 op=LOAD Dec 13 14:31:46.707000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6fbd6830 a2=94 a3=2 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.707000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.708000 audit: BPF prog-id=103 op=UNLOAD Dec 13 14:31:46.845000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.845000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.845000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.845000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.845000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.845000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.845000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.845000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.845000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.845000 audit: BPF prog-id=104 op=LOAD Dec 13 14:31:46.845000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd6fbd66f0 a2=40 a3=1 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.845000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.845000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:31:46.845000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.845000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd6fbd67c0 a2=50 a3=7ffd6fbd68a0 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.845000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6fbd6700 a2=28 a3=0 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6fbd6730 a2=28 a3=0 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6fbd6640 a2=28 a3=0 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6fbd6750 a2=28 a3=0 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6fbd6730 a2=28 a3=0 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6fbd6720 a2=28 a3=0 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6fbd6750 a2=28 a3=0 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6fbd6730 a2=28 a3=0 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6fbd6750 a2=28 a3=0 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd6fbd6720 a2=28 a3=0 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd6fbd6790 a2=28 a3=0 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd6fbd6540 a2=50 a3=1 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit: BPF prog-id=105 op=LOAD Dec 13 14:31:46.858000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd6fbd6540 a2=94 a3=5 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.858000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd6fbd65f0 a2=50 a3=1 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd6fbd6710 a2=4 a3=38 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.858000 audit[2346]: AVC avc: denied { confidentiality } for pid=2346 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:46.858000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd6fbd6760 a2=94 a3=6 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { confidentiality } for pid=2346 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:46.859000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd6fbd5f10 a2=94 a3=83 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.859000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.859000 audit[2346]: AVC avc: denied { confidentiality } for pid=2346 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:31:46.859000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd6fbd5f10 a2=94 a3=83 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.859000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.860000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.860000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd6fbd7950 a2=10 a3=f1f00800 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.860000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.860000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.860000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd6fbd77f0 a2=10 a3=3 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.860000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.860000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.860000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd6fbd7790 a2=10 a3=3 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.860000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.860000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:46.860000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd6fbd7790 a2=10 a3=7 items=0 ppid=2201 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.860000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:31:46.869000 audit: BPF prog-id=100 op=UNLOAD Dec 13 14:31:46.949000 audit[2369]: NETFILTER_CFG table=mangle:69 family=2 entries=16 op=nft_register_chain pid=2369 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:46.949000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffa15b9e00 a2=0 a3=7fffa15b9dec items=0 ppid=2201 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.949000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:46.974000 audit[2368]: NETFILTER_CFG table=raw:70 family=2 entries=21 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:46.974000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc8607e260 a2=0 a3=7ffc8607e24c items=0 ppid=2201 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.974000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:46.974000 audit[2370]: NETFILTER_CFG table=nat:71 family=2 entries=15 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:46.974000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc107b8360 a2=0 a3=7ffc107b834c items=0 ppid=2201 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.974000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:46.979000 audit[2371]: NETFILTER_CFG table=filter:72 family=2 entries=39 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:46.979000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe574f3530 a2=0 a3=7ffe574f351c items=0 ppid=2201 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.979000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:47.203395 kubelet[1565]: E1213 14:31:47.203329 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:47.729647 systemd-networkd[1035]: vxlan.calico: Gained IPv6LL Dec 13 14:31:48.204371 kubelet[1565]: E1213 14:31:48.204308 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:48.293230 kubelet[1565]: I1213 14:31:48.293178 1565 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:31:48.320029 systemd[1]: run-containerd-runc-k8s.io-efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2-runc.peVFaA.mount: Deactivated successfully. Dec 13 14:31:48.419812 systemd[1]: run-containerd-runc-k8s.io-efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2-runc.jSRMXo.mount: Deactivated successfully. Dec 13 14:31:49.205099 kubelet[1565]: E1213 14:31:49.205036 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:50.206233 kubelet[1565]: E1213 14:31:50.206159 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:51.207348 kubelet[1565]: E1213 14:31:51.207274 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:52.207842 kubelet[1565]: E1213 14:31:52.207768 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:52.382197 env[1231]: time="2024-12-13T14:31:52.382128099Z" level=info msg="StopPodSandbox for \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\"" Dec 13 14:31:52.479400 env[1231]: 2024-12-13 14:31:52.438 [INFO][2447] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Dec 13 14:31:52.479400 env[1231]: 2024-12-13 14:31:52.439 [INFO][2447] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" iface="eth0" netns="/var/run/netns/cni-32debd54-abec-d60e-c05a-b42bbf9d1798" Dec 13 14:31:52.479400 env[1231]: 2024-12-13 14:31:52.439 [INFO][2447] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" iface="eth0" netns="/var/run/netns/cni-32debd54-abec-d60e-c05a-b42bbf9d1798" Dec 13 14:31:52.479400 env[1231]: 2024-12-13 14:31:52.439 [INFO][2447] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" iface="eth0" netns="/var/run/netns/cni-32debd54-abec-d60e-c05a-b42bbf9d1798" Dec 13 14:31:52.479400 env[1231]: 2024-12-13 14:31:52.439 [INFO][2447] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Dec 13 14:31:52.479400 env[1231]: 2024-12-13 14:31:52.439 [INFO][2447] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Dec 13 14:31:52.479400 env[1231]: 2024-12-13 14:31:52.464 [INFO][2453] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" HandleID="k8s-pod-network.f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Workload="10.128.0.60-k8s-csi--node--driver--98848-eth0" Dec 13 14:31:52.479400 env[1231]: 2024-12-13 14:31:52.464 [INFO][2453] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:52.479400 env[1231]: 2024-12-13 14:31:52.464 [INFO][2453] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:52.479400 env[1231]: 2024-12-13 14:31:52.473 [WARNING][2453] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" HandleID="k8s-pod-network.f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Workload="10.128.0.60-k8s-csi--node--driver--98848-eth0" Dec 13 14:31:52.479400 env[1231]: 2024-12-13 14:31:52.473 [INFO][2453] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" HandleID="k8s-pod-network.f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Workload="10.128.0.60-k8s-csi--node--driver--98848-eth0" Dec 13 14:31:52.479400 env[1231]: 2024-12-13 14:31:52.475 [INFO][2453] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:52.479400 env[1231]: 2024-12-13 14:31:52.477 [INFO][2447] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Dec 13 14:31:52.481044 env[1231]: time="2024-12-13T14:31:52.480971686Z" level=info msg="TearDown network for sandbox \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\" successfully" Dec 13 14:31:52.481236 env[1231]: time="2024-12-13T14:31:52.481204987Z" level=info msg="StopPodSandbox for \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\" returns successfully" Dec 13 14:31:52.482309 env[1231]: time="2024-12-13T14:31:52.482269517Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-98848,Uid:649f0843-c817-4e51-b153-33c889fdc3bd,Namespace:calico-system,Attempt:1,}" Dec 13 14:31:52.484652 systemd[1]: run-netns-cni\x2d32debd54\x2dabec\x2dd60e\x2dc05a\x2db42bbf9d1798.mount: Deactivated successfully. Dec 13 14:31:52.649083 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:31:52.649236 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali39c019744f4: link becomes ready Dec 13 14:31:52.648449 systemd-networkd[1035]: cali39c019744f4: Link UP Dec 13 14:31:52.657319 systemd-networkd[1035]: cali39c019744f4: Gained carrier Dec 13 14:31:52.682007 env[1231]: 2024-12-13 14:31:52.553 [INFO][2459] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.60-k8s-csi--node--driver--98848-eth0 csi-node-driver- calico-system 649f0843-c817-4e51-b153-33c889fdc3bd 1102 0 2024-12-13 14:31:23 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.128.0.60 csi-node-driver-98848 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali39c019744f4 [] []}} ContainerID="bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a" Namespace="calico-system" Pod="csi-node-driver-98848" WorkloadEndpoint="10.128.0.60-k8s-csi--node--driver--98848-" Dec 13 14:31:52.682007 env[1231]: 2024-12-13 14:31:52.553 [INFO][2459] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a" Namespace="calico-system" Pod="csi-node-driver-98848" WorkloadEndpoint="10.128.0.60-k8s-csi--node--driver--98848-eth0" Dec 13 14:31:52.682007 env[1231]: 2024-12-13 14:31:52.586 [INFO][2470] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a" HandleID="k8s-pod-network.bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a" Workload="10.128.0.60-k8s-csi--node--driver--98848-eth0" Dec 13 14:31:52.682007 env[1231]: 2024-12-13 14:31:52.598 [INFO][2470] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a" HandleID="k8s-pod-network.bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a" Workload="10.128.0.60-k8s-csi--node--driver--98848-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318c30), Attrs:map[string]string{"namespace":"calico-system", "node":"10.128.0.60", "pod":"csi-node-driver-98848", "timestamp":"2024-12-13 14:31:52.586681197 +0000 UTC"}, Hostname:"10.128.0.60", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:31:52.682007 env[1231]: 2024-12-13 14:31:52.598 [INFO][2470] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:52.682007 env[1231]: 2024-12-13 14:31:52.598 [INFO][2470] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:52.682007 env[1231]: 2024-12-13 14:31:52.599 [INFO][2470] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.60' Dec 13 14:31:52.682007 env[1231]: 2024-12-13 14:31:52.601 [INFO][2470] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a" host="10.128.0.60" Dec 13 14:31:52.682007 env[1231]: 2024-12-13 14:31:52.606 [INFO][2470] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.60" Dec 13 14:31:52.682007 env[1231]: 2024-12-13 14:31:52.611 [INFO][2470] ipam/ipam.go 489: Trying affinity for 192.168.64.128/26 host="10.128.0.60" Dec 13 14:31:52.682007 env[1231]: 2024-12-13 14:31:52.613 [INFO][2470] ipam/ipam.go 155: Attempting to load block cidr=192.168.64.128/26 host="10.128.0.60" Dec 13 14:31:52.682007 env[1231]: 2024-12-13 14:31:52.621 [INFO][2470] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.128/26 host="10.128.0.60" Dec 13 14:31:52.682007 env[1231]: 2024-12-13 14:31:52.621 [INFO][2470] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.128/26 handle="k8s-pod-network.bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a" host="10.128.0.60" Dec 13 14:31:52.682007 env[1231]: 2024-12-13 14:31:52.623 [INFO][2470] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a Dec 13 14:31:52.682007 env[1231]: 2024-12-13 14:31:52.629 [INFO][2470] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.64.128/26 handle="k8s-pod-network.bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a" host="10.128.0.60" Dec 13 14:31:52.682007 env[1231]: 2024-12-13 14:31:52.636 [INFO][2470] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.64.129/26] block=192.168.64.128/26 handle="k8s-pod-network.bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a" host="10.128.0.60" Dec 13 14:31:52.682007 env[1231]: 2024-12-13 14:31:52.636 [INFO][2470] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.129/26] handle="k8s-pod-network.bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a" host="10.128.0.60" Dec 13 14:31:52.682007 env[1231]: 2024-12-13 14:31:52.636 [INFO][2470] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:52.682007 env[1231]: 2024-12-13 14:31:52.636 [INFO][2470] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.64.129/26] IPv6=[] ContainerID="bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a" HandleID="k8s-pod-network.bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a" Workload="10.128.0.60-k8s-csi--node--driver--98848-eth0" Dec 13 14:31:52.683341 env[1231]: 2024-12-13 14:31:52.638 [INFO][2459] cni-plugin/k8s.go 386: Populated endpoint ContainerID="bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a" Namespace="calico-system" Pod="csi-node-driver-98848" WorkloadEndpoint="10.128.0.60-k8s-csi--node--driver--98848-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.60-k8s-csi--node--driver--98848-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"649f0843-c817-4e51-b153-33c889fdc3bd", ResourceVersion:"1102", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 31, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.60", ContainerID:"", Pod:"csi-node-driver-98848", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.64.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali39c019744f4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:52.683341 env[1231]: 2024-12-13 14:31:52.638 [INFO][2459] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.64.129/32] ContainerID="bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a" Namespace="calico-system" Pod="csi-node-driver-98848" WorkloadEndpoint="10.128.0.60-k8s-csi--node--driver--98848-eth0" Dec 13 14:31:52.683341 env[1231]: 2024-12-13 14:31:52.638 [INFO][2459] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali39c019744f4 ContainerID="bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a" Namespace="calico-system" Pod="csi-node-driver-98848" WorkloadEndpoint="10.128.0.60-k8s-csi--node--driver--98848-eth0" Dec 13 14:31:52.683341 env[1231]: 2024-12-13 14:31:52.657 [INFO][2459] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a" Namespace="calico-system" Pod="csi-node-driver-98848" WorkloadEndpoint="10.128.0.60-k8s-csi--node--driver--98848-eth0" Dec 13 14:31:52.683341 env[1231]: 2024-12-13 14:31:52.658 [INFO][2459] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a" Namespace="calico-system" Pod="csi-node-driver-98848" WorkloadEndpoint="10.128.0.60-k8s-csi--node--driver--98848-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.60-k8s-csi--node--driver--98848-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"649f0843-c817-4e51-b153-33c889fdc3bd", ResourceVersion:"1102", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 31, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.60", ContainerID:"bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a", Pod:"csi-node-driver-98848", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.64.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali39c019744f4", MAC:"36:dc:aa:61:e5:58", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:52.683341 env[1231]: 2024-12-13 14:31:52.673 [INFO][2459] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a" Namespace="calico-system" Pod="csi-node-driver-98848" WorkloadEndpoint="10.128.0.60-k8s-csi--node--driver--98848-eth0" Dec 13 14:31:52.692000 audit[2483]: NETFILTER_CFG table=filter:73 family=2 entries=34 op=nft_register_chain pid=2483 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:52.700055 kernel: kauditd_printk_skb: 548 callbacks suppressed Dec 13 14:31:52.700215 kernel: audit: type=1325 audit(1734100312.692:668): table=filter:73 family=2 entries=34 op=nft_register_chain pid=2483 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:31:52.714312 env[1231]: time="2024-12-13T14:31:52.714159820Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:52.714779 env[1231]: time="2024-12-13T14:31:52.714701816Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:52.715095 env[1231]: time="2024-12-13T14:31:52.715013788Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:52.715888 env[1231]: time="2024-12-13T14:31:52.715826108Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a pid=2499 runtime=io.containerd.runc.v2 Dec 13 14:31:52.749809 kernel: audit: type=1300 audit(1734100312.692:668): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffc6db73070 a2=0 a3=7ffc6db7305c items=0 ppid=2201 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.692000 audit[2483]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffc6db73070 a2=0 a3=7ffc6db7305c items=0 ppid=2201 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.762127 update_engine[1224]: I1213 14:31:52.761099 1224 update_attempter.cc:509] Updating boot flags... Dec 13 14:31:52.692000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:52.774811 systemd[1]: Started cri-containerd-bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a.scope. Dec 13 14:31:52.793216 kernel: audit: type=1327 audit(1734100312.692:668): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:31:52.818098 kernel: audit: type=1400 audit(1734100312.795:669): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.847079 kernel: audit: type=1400 audit(1734100312.795:670): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.861688 env[1231]: time="2024-12-13T14:31:52.858569115Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-98848,Uid:649f0843-c817-4e51-b153-33c889fdc3bd,Namespace:calico-system,Attempt:1,} returns sandbox id \"bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a\"" Dec 13 14:31:52.861688 env[1231]: time="2024-12-13T14:31:52.860950294Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:31:52.867959 kernel: audit: type=1400 audit(1734100312.795:671): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.868109 kernel: audit: type=1400 audit(1734100312.795:672): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.914966 kernel: audit: type=1400 audit(1734100312.795:673): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.944952 kernel: audit: type=1400 audit(1734100312.795:674): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.973932 kernel: audit: type=1400 audit(1734100312.795:675): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.816000 audit: BPF prog-id=106 op=LOAD Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2499 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266376630373063653462633239303634363966333234343530663764 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2499 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266376630373063653462633239303634363966333234343530663764 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit: BPF prog-id=107 op=LOAD Dec 13 14:31:52.818000 audit[2509]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028f630 items=0 ppid=2499 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266376630373063653462633239303634363966333234343530663764 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit: BPF prog-id=108 op=LOAD Dec 13 14:31:52.818000 audit[2509]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028f678 items=0 ppid=2499 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266376630373063653462633239303634363966333234343530663764 Dec 13 14:31:52.818000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:31:52.818000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:52.818000 audit: BPF prog-id=109 op=LOAD Dec 13 14:31:52.818000 audit[2509]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028fa88 items=0 ppid=2499 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:52.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266376630373063653462633239303634363966333234343530663764 Dec 13 14:31:53.209057 kubelet[1565]: E1213 14:31:53.208987 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:53.383114 env[1231]: time="2024-12-13T14:31:53.383038893Z" level=info msg="StopPodSandbox for \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\"" Dec 13 14:31:53.484598 kubelet[1565]: I1213 14:31:53.484457 1565 topology_manager.go:215] "Topology Admit Handler" podUID="40a6be60-5e42-4124-9600-1b338608e43f" podNamespace="calico-system" podName="calico-typha-86674b4688-xmgsd" Dec 13 14:31:53.494258 systemd[1]: Created slice kubepods-besteffort-pod40a6be60_5e42_4124_9600_1b338608e43f.slice. Dec 13 14:31:53.516946 env[1231]: 2024-12-13 14:31:53.442 [INFO][2559] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Dec 13 14:31:53.516946 env[1231]: 2024-12-13 14:31:53.442 [INFO][2559] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" iface="eth0" netns="/var/run/netns/cni-e69dc57e-efc6-5d60-fa53-71d1b37f4d20" Dec 13 14:31:53.516946 env[1231]: 2024-12-13 14:31:53.442 [INFO][2559] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" iface="eth0" netns="/var/run/netns/cni-e69dc57e-efc6-5d60-fa53-71d1b37f4d20" Dec 13 14:31:53.516946 env[1231]: 2024-12-13 14:31:53.442 [INFO][2559] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" iface="eth0" netns="/var/run/netns/cni-e69dc57e-efc6-5d60-fa53-71d1b37f4d20" Dec 13 14:31:53.516946 env[1231]: 2024-12-13 14:31:53.442 [INFO][2559] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Dec 13 14:31:53.516946 env[1231]: 2024-12-13 14:31:53.443 [INFO][2559] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Dec 13 14:31:53.516946 env[1231]: 2024-12-13 14:31:53.476 [INFO][2565] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" HandleID="k8s-pod-network.c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Workload="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0" Dec 13 14:31:53.516946 env[1231]: 2024-12-13 14:31:53.476 [INFO][2565] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:53.516946 env[1231]: 2024-12-13 14:31:53.476 [INFO][2565] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:53.516946 env[1231]: 2024-12-13 14:31:53.493 [WARNING][2565] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" HandleID="k8s-pod-network.c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Workload="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0" Dec 13 14:31:53.516946 env[1231]: 2024-12-13 14:31:53.493 [INFO][2565] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" HandleID="k8s-pod-network.c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Workload="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0" Dec 13 14:31:53.516946 env[1231]: 2024-12-13 14:31:53.514 [INFO][2565] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:53.516946 env[1231]: 2024-12-13 14:31:53.515 [INFO][2559] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Dec 13 14:31:53.521902 env[1231]: time="2024-12-13T14:31:53.520378738Z" level=info msg="TearDown network for sandbox \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\" successfully" Dec 13 14:31:53.521902 env[1231]: time="2024-12-13T14:31:53.520438343Z" level=info msg="StopPodSandbox for \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\" returns successfully" Dec 13 14:31:53.520427 systemd[1]: run-netns-cni\x2de69dc57e\x2defc6\x2d5d60\x2dfa53\x2d71d1b37f4d20.mount: Deactivated successfully. Dec 13 14:31:53.522555 env[1231]: time="2024-12-13T14:31:53.522508845Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-sfg5f,Uid:363c0ec2-9beb-4b91-969b-f550c1641f47,Namespace:default,Attempt:1,}" Dec 13 14:31:53.558000 audit[2572]: NETFILTER_CFG table=filter:74 family=2 entries=8 op=nft_register_rule pid=2572 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:53.558000 audit[2572]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe64668340 a2=0 a3=7ffe6466832c items=0 ppid=1716 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:53.558000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:53.563000 audit[2572]: NETFILTER_CFG table=nat:75 family=2 entries=30 op=nft_register_rule pid=2572 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:53.563000 audit[2572]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe64668340 a2=0 a3=7ffe6466832c items=0 ppid=1716 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:53.563000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:53.578000 audit[2584]: NETFILTER_CFG table=filter:76 family=2 entries=8 op=nft_register_rule pid=2584 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:53.578000 audit[2584]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff87bc8330 a2=0 a3=7fff87bc831c items=0 ppid=1716 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:53.578000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:53.582000 audit[2584]: NETFILTER_CFG table=nat:77 family=2 entries=30 op=nft_register_rule pid=2584 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:53.582000 audit[2584]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff87bc8330 a2=0 a3=7fff87bc831c items=0 ppid=1716 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:53.582000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:53.626097 kubelet[1565]: I1213 14:31:53.625818 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/40a6be60-5e42-4124-9600-1b338608e43f-typha-certs\") pod \"calico-typha-86674b4688-xmgsd\" (UID: \"40a6be60-5e42-4124-9600-1b338608e43f\") " pod="calico-system/calico-typha-86674b4688-xmgsd" Dec 13 14:31:53.626097 kubelet[1565]: I1213 14:31:53.625908 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8brkf\" (UniqueName: \"kubernetes.io/projected/40a6be60-5e42-4124-9600-1b338608e43f-kube-api-access-8brkf\") pod \"calico-typha-86674b4688-xmgsd\" (UID: \"40a6be60-5e42-4124-9600-1b338608e43f\") " pod="calico-system/calico-typha-86674b4688-xmgsd" Dec 13 14:31:53.626097 kubelet[1565]: I1213 14:31:53.625958 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/40a6be60-5e42-4124-9600-1b338608e43f-tigera-ca-bundle\") pod \"calico-typha-86674b4688-xmgsd\" (UID: \"40a6be60-5e42-4124-9600-1b338608e43f\") " pod="calico-system/calico-typha-86674b4688-xmgsd" Dec 13 14:31:53.650445 systemd[1]: run-containerd-runc-k8s.io-efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2-runc.S3ZU51.mount: Deactivated successfully. Dec 13 14:31:53.681595 systemd-networkd[1035]: cali39c019744f4: Gained IPv6LL Dec 13 14:31:53.807805 env[1231]: time="2024-12-13T14:31:53.806196285Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-86674b4688-xmgsd,Uid:40a6be60-5e42-4124-9600-1b338608e43f,Namespace:calico-system,Attempt:0,}" Dec 13 14:31:53.865567 env[1231]: time="2024-12-13T14:31:53.865519338Z" level=info msg="StopContainer for \"efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2\" with timeout 5 (s)" Dec 13 14:31:53.868497 env[1231]: time="2024-12-13T14:31:53.868445683Z" level=info msg="Stop container \"efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2\" with signal terminated" Dec 13 14:31:53.896594 env[1231]: time="2024-12-13T14:31:53.896511574Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:53.896939 env[1231]: time="2024-12-13T14:31:53.896891978Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:53.897134 env[1231]: time="2024-12-13T14:31:53.897090162Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:53.901333 env[1231]: time="2024-12-13T14:31:53.898018024Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b06cea7b0b620a369d4a6fa413f3c924f2d85d8593c2c19c233e9e6cb104c532 pid=2653 runtime=io.containerd.runc.v2 Dec 13 14:31:53.908635 systemd[1]: cri-containerd-efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2.scope: Deactivated successfully. Dec 13 14:31:53.909042 systemd[1]: cri-containerd-efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2.scope: Consumed 1.808s CPU time. Dec 13 14:31:53.932378 systemd[1]: Started cri-containerd-b06cea7b0b620a369d4a6fa413f3c924f2d85d8593c2c19c233e9e6cb104c532.scope. Dec 13 14:31:53.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.962000 audit: BPF prog-id=110 op=LOAD Dec 13 14:31:53.964000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.964000 audit[2664]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2653 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:53.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230366365613762306236323061333639643461366661343133663363 Dec 13 14:31:53.964000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.964000 audit[2664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2653 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:53.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230366365613762306236323061333639643461366661343133663363 Dec 13 14:31:53.964000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.964000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.964000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.964000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.964000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.964000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.964000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.964000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.964000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.964000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.964000 audit: BPF prog-id=111 op=LOAD Dec 13 14:31:53.964000 audit[2664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c5400 items=0 ppid=2653 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:53.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230366365613762306236323061333639643461366661343133663363 Dec 13 14:31:53.966000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.966000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.966000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.966000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.966000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.966000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.966000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.966000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.966000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.966000 audit: BPF prog-id=112 op=LOAD Dec 13 14:31:53.966000 audit[2664]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c5448 items=0 ppid=2653 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:53.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230366365613762306236323061333639643461366661343133663363 Dec 13 14:31:53.967000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:31:53.967000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:31:53.967000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.967000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.967000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.967000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.967000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.967000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.967000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.967000 audit[2664]: AVC avc: denied { perfmon } for pid=2664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.967000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.967000 audit[2664]: AVC avc: denied { bpf } for pid=2664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:53.967000 audit: BPF prog-id=113 op=LOAD Dec 13 14:31:53.967000 audit[2664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c5858 items=0 ppid=2653 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:53.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230366365613762306236323061333639643461366661343133663363 Dec 13 14:31:54.026748 env[1231]: time="2024-12-13T14:31:54.026639486Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-86674b4688-xmgsd,Uid:40a6be60-5e42-4124-9600-1b338608e43f,Namespace:calico-system,Attempt:0,} returns sandbox id \"b06cea7b0b620a369d4a6fa413f3c924f2d85d8593c2c19c233e9e6cb104c532\"" Dec 13 14:31:54.091554 systemd-networkd[1035]: cali5251a0dd546: Link UP Dec 13 14:31:54.094923 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:31:54.102997 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5251a0dd546: link becomes ready Dec 13 14:31:54.103339 systemd-networkd[1035]: cali5251a0dd546: Gained carrier Dec 13 14:31:54.136739 env[1231]: 2024-12-13 14:31:53.679 [INFO][2573] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0 nginx-deployment-6d5f899847- default 363c0ec2-9beb-4b91-969b-f550c1641f47 1115 0 2024-12-13 14:31:37 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.60 nginx-deployment-6d5f899847-sfg5f eth0 default [] [] [kns.default ksa.default.default] cali5251a0dd546 [] []}} ContainerID="873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff" Namespace="default" Pod="nginx-deployment-6d5f899847-sfg5f" WorkloadEndpoint="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-" Dec 13 14:31:54.136739 env[1231]: 2024-12-13 14:31:53.679 [INFO][2573] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff" Namespace="default" Pod="nginx-deployment-6d5f899847-sfg5f" WorkloadEndpoint="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0" Dec 13 14:31:54.136739 env[1231]: 2024-12-13 14:31:53.804 [INFO][2627] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff" HandleID="k8s-pod-network.873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff" Workload="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0" Dec 13 14:31:54.136739 env[1231]: 2024-12-13 14:31:53.873 [INFO][2627] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff" HandleID="k8s-pod-network.873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff" Workload="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318fd0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.60", "pod":"nginx-deployment-6d5f899847-sfg5f", "timestamp":"2024-12-13 14:31:53.804394389 +0000 UTC"}, Hostname:"10.128.0.60", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:31:54.136739 env[1231]: 2024-12-13 14:31:53.873 [INFO][2627] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:31:54.136739 env[1231]: 2024-12-13 14:31:53.873 [INFO][2627] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:31:54.136739 env[1231]: 2024-12-13 14:31:53.873 [INFO][2627] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.60' Dec 13 14:31:54.136739 env[1231]: 2024-12-13 14:31:53.991 [INFO][2627] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff" host="10.128.0.60" Dec 13 14:31:54.136739 env[1231]: 2024-12-13 14:31:54.022 [INFO][2627] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.60" Dec 13 14:31:54.136739 env[1231]: 2024-12-13 14:31:54.052 [INFO][2627] ipam/ipam.go 489: Trying affinity for 192.168.64.128/26 host="10.128.0.60" Dec 13 14:31:54.136739 env[1231]: 2024-12-13 14:31:54.055 [INFO][2627] ipam/ipam.go 155: Attempting to load block cidr=192.168.64.128/26 host="10.128.0.60" Dec 13 14:31:54.136739 env[1231]: 2024-12-13 14:31:54.059 [INFO][2627] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.128/26 host="10.128.0.60" Dec 13 14:31:54.136739 env[1231]: 2024-12-13 14:31:54.059 [INFO][2627] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.128/26 handle="k8s-pod-network.873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff" host="10.128.0.60" Dec 13 14:31:54.136739 env[1231]: 2024-12-13 14:31:54.063 [INFO][2627] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff Dec 13 14:31:54.136739 env[1231]: 2024-12-13 14:31:54.069 [INFO][2627] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.64.128/26 handle="k8s-pod-network.873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff" host="10.128.0.60" Dec 13 14:31:54.136739 env[1231]: 2024-12-13 14:31:54.083 [INFO][2627] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.64.130/26] block=192.168.64.128/26 handle="k8s-pod-network.873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff" host="10.128.0.60" Dec 13 14:31:54.136739 env[1231]: 2024-12-13 14:31:54.083 [INFO][2627] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.130/26] handle="k8s-pod-network.873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff" host="10.128.0.60" Dec 13 14:31:54.136739 env[1231]: 2024-12-13 14:31:54.083 [INFO][2627] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:31:54.136739 env[1231]: 2024-12-13 14:31:54.083 [INFO][2627] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.64.130/26] IPv6=[] ContainerID="873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff" HandleID="k8s-pod-network.873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff" Workload="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0" Dec 13 14:31:54.138122 env[1231]: 2024-12-13 14:31:54.085 [INFO][2573] cni-plugin/k8s.go 386: Populated endpoint ContainerID="873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff" Namespace="default" Pod="nginx-deployment-6d5f899847-sfg5f" WorkloadEndpoint="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"363c0ec2-9beb-4b91-969b-f550c1641f47", ResourceVersion:"1115", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 31, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.60", ContainerID:"", Pod:"nginx-deployment-6d5f899847-sfg5f", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5251a0dd546", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:54.138122 env[1231]: 2024-12-13 14:31:54.085 [INFO][2573] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.64.130/32] ContainerID="873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff" Namespace="default" Pod="nginx-deployment-6d5f899847-sfg5f" WorkloadEndpoint="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0" Dec 13 14:31:54.138122 env[1231]: 2024-12-13 14:31:54.086 [INFO][2573] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5251a0dd546 ContainerID="873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff" Namespace="default" Pod="nginx-deployment-6d5f899847-sfg5f" WorkloadEndpoint="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0" Dec 13 14:31:54.138122 env[1231]: 2024-12-13 14:31:54.105 [INFO][2573] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff" Namespace="default" Pod="nginx-deployment-6d5f899847-sfg5f" WorkloadEndpoint="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0" Dec 13 14:31:54.138122 env[1231]: 2024-12-13 14:31:54.105 [INFO][2573] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff" Namespace="default" Pod="nginx-deployment-6d5f899847-sfg5f" WorkloadEndpoint="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"363c0ec2-9beb-4b91-969b-f550c1641f47", ResourceVersion:"1115", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 31, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.60", ContainerID:"873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff", Pod:"nginx-deployment-6d5f899847-sfg5f", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5251a0dd546", MAC:"ba:e9:27:80:f6:a4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:31:54.138122 env[1231]: 2024-12-13 14:31:54.134 [INFO][2573] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff" Namespace="default" Pod="nginx-deployment-6d5f899847-sfg5f" WorkloadEndpoint="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0" Dec 13 14:31:54.209580 kubelet[1565]: E1213 14:31:54.209536 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:54.473558 env[1231]: time="2024-12-13T14:31:54.473318318Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:54.473558 env[1231]: time="2024-12-13T14:31:54.473383647Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:54.473558 env[1231]: time="2024-12-13T14:31:54.473402686Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:54.475644 env[1231]: time="2024-12-13T14:31:54.475556355Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff pid=2721 runtime=io.containerd.runc.v2 Dec 13 14:31:54.495696 systemd[1]: Started cri-containerd-873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff.scope. Dec 13 14:31:54.525073 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2-rootfs.mount: Deactivated successfully. Dec 13 14:31:54.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.529000 audit: BPF prog-id=114 op=LOAD Dec 13 14:31:54.530000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.530000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2721 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837336335393631316535323361613936356165363733313739343639 Dec 13 14:31:54.530000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.530000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2721 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837336335393631316535323361613936356165363733313739343639 Dec 13 14:31:54.531000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.531000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.531000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.531000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.531000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.531000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.531000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.531000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.531000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.531000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.531000 audit: BPF prog-id=115 op=LOAD Dec 13 14:31:54.531000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000319230 items=0 ppid=2721 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837336335393631316535323361613936356165363733313739343639 Dec 13 14:31:54.532000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.532000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.532000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.532000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.532000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.532000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.532000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.532000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.532000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.532000 audit: BPF prog-id=116 op=LOAD Dec 13 14:31:54.532000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000319278 items=0 ppid=2721 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837336335393631316535323361613936356165363733313739343639 Dec 13 14:31:54.533000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:31:54.534000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:31:54.534000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.534000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.534000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.534000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.534000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.534000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.534000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.534000 audit[2732]: AVC avc: denied { perfmon } for pid=2732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.534000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.534000 audit[2732]: AVC avc: denied { bpf } for pid=2732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:54.534000 audit: BPF prog-id=117 op=LOAD Dec 13 14:31:54.534000 audit[2732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000319688 items=0 ppid=2721 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:54.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837336335393631316535323361613936356165363733313739343639 Dec 13 14:31:54.572737 env[1231]: time="2024-12-13T14:31:54.572679681Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-sfg5f,Uid:363c0ec2-9beb-4b91-969b-f550c1641f47,Namespace:default,Attempt:1,} returns sandbox id \"873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff\"" Dec 13 14:31:55.210697 kubelet[1565]: E1213 14:31:55.210627 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:55.451365 env[1231]: time="2024-12-13T14:31:55.451289485Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:55.473195 systemd-networkd[1035]: cali5251a0dd546: Gained IPv6LL Dec 13 14:31:55.578400 env[1231]: time="2024-12-13T14:31:55.577756650Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:55.582913 env[1231]: time="2024-12-13T14:31:55.582837027Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:55.585328 env[1231]: time="2024-12-13T14:31:55.585258134Z" level=info msg="shim disconnected" id=efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2 Dec 13 14:31:55.585328 env[1231]: time="2024-12-13T14:31:55.585314409Z" level=warning msg="cleaning up after shim disconnected" id=efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2 namespace=k8s.io Dec 13 14:31:55.585328 env[1231]: time="2024-12-13T14:31:55.585331295Z" level=info msg="cleaning up dead shim" Dec 13 14:31:55.586367 env[1231]: time="2024-12-13T14:31:55.586322765Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:55.586775 env[1231]: time="2024-12-13T14:31:55.586725674Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:31:55.589240 env[1231]: time="2024-12-13T14:31:55.589207564Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:31:55.590513 env[1231]: time="2024-12-13T14:31:55.590465541Z" level=info msg="CreateContainer within sandbox \"bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:31:55.613132 env[1231]: time="2024-12-13T14:31:55.610445839Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2756 runtime=io.containerd.runc.v2\n" Dec 13 14:31:55.613132 env[1231]: time="2024-12-13T14:31:55.613001559Z" level=info msg="CreateContainer within sandbox \"bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"2abaf966ed79e75682e002fd0a661efa5a8ae44c56833f16dde2daafeac714d2\"" Dec 13 14:31:55.614240 env[1231]: time="2024-12-13T14:31:55.614133790Z" level=info msg="StartContainer for \"2abaf966ed79e75682e002fd0a661efa5a8ae44c56833f16dde2daafeac714d2\"" Dec 13 14:31:55.616227 env[1231]: time="2024-12-13T14:31:55.616179447Z" level=info msg="StopContainer for \"efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2\" returns successfully" Dec 13 14:31:55.617047 env[1231]: time="2024-12-13T14:31:55.617011139Z" level=info msg="StopPodSandbox for \"8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246\"" Dec 13 14:31:55.617190 env[1231]: time="2024-12-13T14:31:55.617085648Z" level=info msg="Container to stop \"3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:31:55.617190 env[1231]: time="2024-12-13T14:31:55.617112252Z" level=info msg="Container to stop \"0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:31:55.617190 env[1231]: time="2024-12-13T14:31:55.617131045Z" level=info msg="Container to stop \"efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:31:55.620778 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246-shm.mount: Deactivated successfully. Dec 13 14:31:55.628000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:31:55.628913 systemd[1]: cri-containerd-8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246.scope: Deactivated successfully. Dec 13 14:31:55.632000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:31:55.674254 systemd[1]: Started cri-containerd-2abaf966ed79e75682e002fd0a661efa5a8ae44c56833f16dde2daafeac714d2.scope. Dec 13 14:31:55.697206 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246-rootfs.mount: Deactivated successfully. Dec 13 14:31:55.707763 env[1231]: time="2024-12-13T14:31:55.707371021Z" level=info msg="shim disconnected" id=8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246 Dec 13 14:31:55.707763 env[1231]: time="2024-12-13T14:31:55.707455470Z" level=warning msg="cleaning up after shim disconnected" id=8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246 namespace=k8s.io Dec 13 14:31:55.707763 env[1231]: time="2024-12-13T14:31:55.707475230Z" level=info msg="cleaning up dead shim" Dec 13 14:31:55.706000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.706000 audit[2784]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f19aa981cb8 items=0 ppid=2499 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:55.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261626166393636656437396537353638326530303266643061363631 Dec 13 14:31:55.709000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.709000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.709000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.709000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.709000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.709000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.709000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.709000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.709000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.709000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.709000 audit: BPF prog-id=118 op=LOAD Dec 13 14:31:55.709000 audit[2784]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b4cd8 items=0 ppid=2499 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:55.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261626166393636656437396537353638326530303266643061363631 Dec 13 14:31:55.710000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.710000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.710000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.710000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.710000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.710000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.710000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.710000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.710000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.710000 audit: BPF prog-id=119 op=LOAD Dec 13 14:31:55.710000 audit[2784]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b4d28 items=0 ppid=2499 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:55.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261626166393636656437396537353638326530303266643061363631 Dec 13 14:31:55.711000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:31:55.712000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:31:55.712000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.712000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.712000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.712000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.712000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.712000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.712000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.712000 audit[2784]: AVC avc: denied { perfmon } for pid=2784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.712000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.712000 audit[2784]: AVC avc: denied { bpf } for pid=2784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:55.712000 audit: BPF prog-id=120 op=LOAD Dec 13 14:31:55.712000 audit[2784]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b4db8 items=0 ppid=2499 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:55.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261626166393636656437396537353638326530303266643061363631 Dec 13 14:31:55.729737 env[1231]: time="2024-12-13T14:31:55.725066220Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2812 runtime=io.containerd.runc.v2\n" Dec 13 14:31:55.729737 env[1231]: time="2024-12-13T14:31:55.725469521Z" level=info msg="TearDown network for sandbox \"8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246\" successfully" Dec 13 14:31:55.729737 env[1231]: time="2024-12-13T14:31:55.725504675Z" level=info msg="StopPodSandbox for \"8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246\" returns successfully" Dec 13 14:31:55.748889 kubelet[1565]: I1213 14:31:55.743359 1565 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1748f079-9014-4649-84ed-0aa8b19201e5-node-certs\") pod \"1748f079-9014-4649-84ed-0aa8b19201e5\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " Dec 13 14:31:55.748889 kubelet[1565]: I1213 14:31:55.743431 1565 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-xtables-lock\") pod \"1748f079-9014-4649-84ed-0aa8b19201e5\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " Dec 13 14:31:55.748889 kubelet[1565]: I1213 14:31:55.743466 1565 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-var-run-calico\") pod \"1748f079-9014-4649-84ed-0aa8b19201e5\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " Dec 13 14:31:55.748889 kubelet[1565]: I1213 14:31:55.743504 1565 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-cni-net-dir\") pod \"1748f079-9014-4649-84ed-0aa8b19201e5\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " Dec 13 14:31:55.748889 kubelet[1565]: I1213 14:31:55.743537 1565 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-policysync\") pod \"1748f079-9014-4649-84ed-0aa8b19201e5\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " Dec 13 14:31:55.748889 kubelet[1565]: I1213 14:31:55.743576 1565 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1748f079-9014-4649-84ed-0aa8b19201e5-tigera-ca-bundle\") pod \"1748f079-9014-4649-84ed-0aa8b19201e5\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " Dec 13 14:31:55.749404 kubelet[1565]: I1213 14:31:55.743612 1565 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-cni-bin-dir\") pod \"1748f079-9014-4649-84ed-0aa8b19201e5\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " Dec 13 14:31:55.749404 kubelet[1565]: I1213 14:31:55.743639 1565 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-lib-modules\") pod \"1748f079-9014-4649-84ed-0aa8b19201e5\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " Dec 13 14:31:55.749404 kubelet[1565]: I1213 14:31:55.743667 1565 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-var-lib-calico\") pod \"1748f079-9014-4649-84ed-0aa8b19201e5\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " Dec 13 14:31:55.749404 kubelet[1565]: I1213 14:31:55.743696 1565 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-flexvol-driver-host\") pod \"1748f079-9014-4649-84ed-0aa8b19201e5\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " Dec 13 14:31:55.749404 kubelet[1565]: I1213 14:31:55.743746 1565 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-k96p2\" (UniqueName: \"kubernetes.io/projected/1748f079-9014-4649-84ed-0aa8b19201e5-kube-api-access-k96p2\") pod \"1748f079-9014-4649-84ed-0aa8b19201e5\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " Dec 13 14:31:55.749404 kubelet[1565]: I1213 14:31:55.743783 1565 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-cni-log-dir\") pod \"1748f079-9014-4649-84ed-0aa8b19201e5\" (UID: \"1748f079-9014-4649-84ed-0aa8b19201e5\") " Dec 13 14:31:55.749724 kubelet[1565]: I1213 14:31:55.743904 1565 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "1748f079-9014-4649-84ed-0aa8b19201e5" (UID: "1748f079-9014-4649-84ed-0aa8b19201e5"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:55.750804 kubelet[1565]: I1213 14:31:55.750019 1565 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "1748f079-9014-4649-84ed-0aa8b19201e5" (UID: "1748f079-9014-4649-84ed-0aa8b19201e5"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:55.750804 kubelet[1565]: I1213 14:31:55.750102 1565 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "1748f079-9014-4649-84ed-0aa8b19201e5" (UID: "1748f079-9014-4649-84ed-0aa8b19201e5"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:55.750804 kubelet[1565]: I1213 14:31:55.750139 1565 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "1748f079-9014-4649-84ed-0aa8b19201e5" (UID: "1748f079-9014-4649-84ed-0aa8b19201e5"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:55.750804 kubelet[1565]: I1213 14:31:55.750175 1565 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-policysync" (OuterVolumeSpecName: "policysync") pod "1748f079-9014-4649-84ed-0aa8b19201e5" (UID: "1748f079-9014-4649-84ed-0aa8b19201e5"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:55.750804 kubelet[1565]: I1213 14:31:55.750212 1565 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "1748f079-9014-4649-84ed-0aa8b19201e5" (UID: "1748f079-9014-4649-84ed-0aa8b19201e5"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:55.751249 kubelet[1565]: I1213 14:31:55.750249 1565 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "1748f079-9014-4649-84ed-0aa8b19201e5" (UID: "1748f079-9014-4649-84ed-0aa8b19201e5"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:55.751249 kubelet[1565]: I1213 14:31:55.750288 1565 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "1748f079-9014-4649-84ed-0aa8b19201e5" (UID: "1748f079-9014-4649-84ed-0aa8b19201e5"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:55.751249 kubelet[1565]: I1213 14:31:55.750323 1565 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "1748f079-9014-4649-84ed-0aa8b19201e5" (UID: "1748f079-9014-4649-84ed-0aa8b19201e5"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:31:55.756575 kubelet[1565]: I1213 14:31:55.756479 1565 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/1748f079-9014-4649-84ed-0aa8b19201e5-node-certs" (OuterVolumeSpecName: "node-certs") pod "1748f079-9014-4649-84ed-0aa8b19201e5" (UID: "1748f079-9014-4649-84ed-0aa8b19201e5"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 14:31:55.756763 env[1231]: time="2024-12-13T14:31:55.756547629Z" level=info msg="StartContainer for \"2abaf966ed79e75682e002fd0a661efa5a8ae44c56833f16dde2daafeac714d2\" returns successfully" Dec 13 14:31:55.758861 kubelet[1565]: I1213 14:31:55.758774 1565 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/1748f079-9014-4649-84ed-0aa8b19201e5-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "1748f079-9014-4649-84ed-0aa8b19201e5" (UID: "1748f079-9014-4649-84ed-0aa8b19201e5"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 14:31:55.761719 kubelet[1565]: I1213 14:31:55.761668 1565 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/1748f079-9014-4649-84ed-0aa8b19201e5-kube-api-access-k96p2" (OuterVolumeSpecName: "kube-api-access-k96p2") pod "1748f079-9014-4649-84ed-0aa8b19201e5" (UID: "1748f079-9014-4649-84ed-0aa8b19201e5"). InnerVolumeSpecName "kube-api-access-k96p2". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 14:31:55.844396 kubelet[1565]: I1213 14:31:55.844343 1565 reconciler_common.go:300] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-var-lib-calico\") on node \"10.128.0.60\" DevicePath \"\"" Dec 13 14:31:55.844713 kubelet[1565]: I1213 14:31:55.844684 1565 reconciler_common.go:300] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-flexvol-driver-host\") on node \"10.128.0.60\" DevicePath \"\"" Dec 13 14:31:55.844835 kubelet[1565]: I1213 14:31:55.844720 1565 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-k96p2\" (UniqueName: \"kubernetes.io/projected/1748f079-9014-4649-84ed-0aa8b19201e5-kube-api-access-k96p2\") on node \"10.128.0.60\" DevicePath \"\"" Dec 13 14:31:55.844835 kubelet[1565]: I1213 14:31:55.844739 1565 reconciler_common.go:300] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-cni-log-dir\") on node \"10.128.0.60\" DevicePath \"\"" Dec 13 14:31:55.844835 kubelet[1565]: I1213 14:31:55.844756 1565 reconciler_common.go:300] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1748f079-9014-4649-84ed-0aa8b19201e5-node-certs\") on node \"10.128.0.60\" DevicePath \"\"" Dec 13 14:31:55.844835 kubelet[1565]: I1213 14:31:55.844773 1565 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-xtables-lock\") on node \"10.128.0.60\" DevicePath \"\"" Dec 13 14:31:55.844835 kubelet[1565]: I1213 14:31:55.844789 1565 reconciler_common.go:300] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-var-run-calico\") on node \"10.128.0.60\" DevicePath \"\"" Dec 13 14:31:55.844835 kubelet[1565]: I1213 14:31:55.844805 1565 reconciler_common.go:300] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-cni-net-dir\") on node \"10.128.0.60\" DevicePath \"\"" Dec 13 14:31:55.844835 kubelet[1565]: I1213 14:31:55.844821 1565 reconciler_common.go:300] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-policysync\") on node \"10.128.0.60\" DevicePath \"\"" Dec 13 14:31:55.844835 kubelet[1565]: I1213 14:31:55.844837 1565 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1748f079-9014-4649-84ed-0aa8b19201e5-tigera-ca-bundle\") on node \"10.128.0.60\" DevicePath \"\"" Dec 13 14:31:55.845175 kubelet[1565]: I1213 14:31:55.844870 1565 reconciler_common.go:300] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-cni-bin-dir\") on node \"10.128.0.60\" DevicePath \"\"" Dec 13 14:31:55.845175 kubelet[1565]: I1213 14:31:55.844888 1565 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1748f079-9014-4649-84ed-0aa8b19201e5-lib-modules\") on node \"10.128.0.60\" DevicePath \"\"" Dec 13 14:31:55.856396 kubelet[1565]: I1213 14:31:55.856339 1565 topology_manager.go:215] "Topology Admit Handler" podUID="dccfe3f2-b329-4044-bc8e-fb0284c0a6ef" podNamespace="calico-system" podName="calico-node-4zwlw" Dec 13 14:31:55.856396 kubelet[1565]: E1213 14:31:55.856411 1565 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="1748f079-9014-4649-84ed-0aa8b19201e5" containerName="flexvol-driver" Dec 13 14:31:55.856668 kubelet[1565]: E1213 14:31:55.856427 1565 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="1748f079-9014-4649-84ed-0aa8b19201e5" containerName="install-cni" Dec 13 14:31:55.856668 kubelet[1565]: E1213 14:31:55.856437 1565 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="1748f079-9014-4649-84ed-0aa8b19201e5" containerName="calico-node" Dec 13 14:31:55.856668 kubelet[1565]: I1213 14:31:55.856471 1565 memory_manager.go:354] "RemoveStaleState removing state" podUID="1748f079-9014-4649-84ed-0aa8b19201e5" containerName="calico-node" Dec 13 14:31:55.863593 systemd[1]: Created slice kubepods-besteffort-poddccfe3f2_b329_4044_bc8e_fb0284c0a6ef.slice. Dec 13 14:31:55.945091 kubelet[1565]: I1213 14:31:55.945039 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/dccfe3f2-b329-4044-bc8e-fb0284c0a6ef-var-run-calico\") pod \"calico-node-4zwlw\" (UID: \"dccfe3f2-b329-4044-bc8e-fb0284c0a6ef\") " pod="calico-system/calico-node-4zwlw" Dec 13 14:31:55.945335 kubelet[1565]: I1213 14:31:55.945153 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/dccfe3f2-b329-4044-bc8e-fb0284c0a6ef-cni-bin-dir\") pod \"calico-node-4zwlw\" (UID: \"dccfe3f2-b329-4044-bc8e-fb0284c0a6ef\") " pod="calico-system/calico-node-4zwlw" Dec 13 14:31:55.945335 kubelet[1565]: I1213 14:31:55.945233 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/dccfe3f2-b329-4044-bc8e-fb0284c0a6ef-flexvol-driver-host\") pod \"calico-node-4zwlw\" (UID: \"dccfe3f2-b329-4044-bc8e-fb0284c0a6ef\") " pod="calico-system/calico-node-4zwlw" Dec 13 14:31:55.945335 kubelet[1565]: I1213 14:31:55.945273 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g6z74\" (UniqueName: \"kubernetes.io/projected/dccfe3f2-b329-4044-bc8e-fb0284c0a6ef-kube-api-access-g6z74\") pod \"calico-node-4zwlw\" (UID: \"dccfe3f2-b329-4044-bc8e-fb0284c0a6ef\") " pod="calico-system/calico-node-4zwlw" Dec 13 14:31:55.945335 kubelet[1565]: I1213 14:31:55.945312 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/dccfe3f2-b329-4044-bc8e-fb0284c0a6ef-cni-net-dir\") pod \"calico-node-4zwlw\" (UID: \"dccfe3f2-b329-4044-bc8e-fb0284c0a6ef\") " pod="calico-system/calico-node-4zwlw" Dec 13 14:31:55.945604 kubelet[1565]: I1213 14:31:55.945346 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dccfe3f2-b329-4044-bc8e-fb0284c0a6ef-xtables-lock\") pod \"calico-node-4zwlw\" (UID: \"dccfe3f2-b329-4044-bc8e-fb0284c0a6ef\") " pod="calico-system/calico-node-4zwlw" Dec 13 14:31:55.945604 kubelet[1565]: I1213 14:31:55.945380 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/dccfe3f2-b329-4044-bc8e-fb0284c0a6ef-node-certs\") pod \"calico-node-4zwlw\" (UID: \"dccfe3f2-b329-4044-bc8e-fb0284c0a6ef\") " pod="calico-system/calico-node-4zwlw" Dec 13 14:31:55.945604 kubelet[1565]: I1213 14:31:55.945415 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dccfe3f2-b329-4044-bc8e-fb0284c0a6ef-lib-modules\") pod \"calico-node-4zwlw\" (UID: \"dccfe3f2-b329-4044-bc8e-fb0284c0a6ef\") " pod="calico-system/calico-node-4zwlw" Dec 13 14:31:55.945604 kubelet[1565]: I1213 14:31:55.945451 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/dccfe3f2-b329-4044-bc8e-fb0284c0a6ef-policysync\") pod \"calico-node-4zwlw\" (UID: \"dccfe3f2-b329-4044-bc8e-fb0284c0a6ef\") " pod="calico-system/calico-node-4zwlw" Dec 13 14:31:55.945604 kubelet[1565]: I1213 14:31:55.945489 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dccfe3f2-b329-4044-bc8e-fb0284c0a6ef-tigera-ca-bundle\") pod \"calico-node-4zwlw\" (UID: \"dccfe3f2-b329-4044-bc8e-fb0284c0a6ef\") " pod="calico-system/calico-node-4zwlw" Dec 13 14:31:55.945931 kubelet[1565]: I1213 14:31:55.945543 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/dccfe3f2-b329-4044-bc8e-fb0284c0a6ef-var-lib-calico\") pod \"calico-node-4zwlw\" (UID: \"dccfe3f2-b329-4044-bc8e-fb0284c0a6ef\") " pod="calico-system/calico-node-4zwlw" Dec 13 14:31:55.945931 kubelet[1565]: I1213 14:31:55.945585 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/dccfe3f2-b329-4044-bc8e-fb0284c0a6ef-cni-log-dir\") pod \"calico-node-4zwlw\" (UID: \"dccfe3f2-b329-4044-bc8e-fb0284c0a6ef\") " pod="calico-system/calico-node-4zwlw" Dec 13 14:31:56.167785 env[1231]: time="2024-12-13T14:31:56.167724024Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4zwlw,Uid:dccfe3f2-b329-4044-bc8e-fb0284c0a6ef,Namespace:calico-system,Attempt:0,}" Dec 13 14:31:56.193903 env[1231]: time="2024-12-13T14:31:56.193777166Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:31:56.194196 env[1231]: time="2024-12-13T14:31:56.193835693Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:31:56.194196 env[1231]: time="2024-12-13T14:31:56.193888267Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:31:56.194196 env[1231]: time="2024-12-13T14:31:56.194073369Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/55e2c8535a26f0449ec1fdf93bc7e1a33b9168000a18b09a2809781f1b180cf5 pid=2846 runtime=io.containerd.runc.v2 Dec 13 14:31:56.211087 systemd[1]: Started cri-containerd-55e2c8535a26f0449ec1fdf93bc7e1a33b9168000a18b09a2809781f1b180cf5.scope. Dec 13 14:31:56.212129 kubelet[1565]: E1213 14:31:56.211552 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:56.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.235000 audit: BPF prog-id=121 op=LOAD Dec 13 14:31:56.236000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.236000 audit[2855]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2846 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535653263383533356132366630343439656331666466393362633765 Dec 13 14:31:56.236000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.236000 audit[2855]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2846 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535653263383533356132366630343439656331666466393362633765 Dec 13 14:31:56.237000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.237000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.237000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.237000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.237000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.237000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.237000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.237000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.237000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.237000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.237000 audit: BPF prog-id=122 op=LOAD Dec 13 14:31:56.237000 audit[2855]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000319000 items=0 ppid=2846 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535653263383533356132366630343439656331666466393362633765 Dec 13 14:31:56.238000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.238000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.238000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.238000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.238000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.238000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.238000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.238000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.238000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.238000 audit: BPF prog-id=123 op=LOAD Dec 13 14:31:56.238000 audit[2855]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000319048 items=0 ppid=2846 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535653263383533356132366630343439656331666466393362633765 Dec 13 14:31:56.239000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:31:56.239000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:31:56.239000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.239000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.239000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.239000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.239000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.239000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.239000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.239000 audit[2855]: AVC avc: denied { perfmon } for pid=2855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.239000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.239000 audit[2855]: AVC avc: denied { bpf } for pid=2855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.239000 audit: BPF prog-id=124 op=LOAD Dec 13 14:31:56.239000 audit[2855]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000319458 items=0 ppid=2846 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535653263383533356132366630343439656331666466393362633765 Dec 13 14:31:56.262741 env[1231]: time="2024-12-13T14:31:56.262684581Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4zwlw,Uid:dccfe3f2-b329-4044-bc8e-fb0284c0a6ef,Namespace:calico-system,Attempt:0,} returns sandbox id \"55e2c8535a26f0449ec1fdf93bc7e1a33b9168000a18b09a2809781f1b180cf5\"" Dec 13 14:31:56.266813 env[1231]: time="2024-12-13T14:31:56.266757665Z" level=info msg="CreateContainer within sandbox \"55e2c8535a26f0449ec1fdf93bc7e1a33b9168000a18b09a2809781f1b180cf5\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:31:56.287275 env[1231]: time="2024-12-13T14:31:56.287200474Z" level=info msg="CreateContainer within sandbox \"55e2c8535a26f0449ec1fdf93bc7e1a33b9168000a18b09a2809781f1b180cf5\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"827a23c6239b470c98aab789bb65c34e7a6b6d2984a2cb09ed655e53b53b1a8f\"" Dec 13 14:31:56.288066 env[1231]: time="2024-12-13T14:31:56.288011132Z" level=info msg="StartContainer for \"827a23c6239b470c98aab789bb65c34e7a6b6d2984a2cb09ed655e53b53b1a8f\"" Dec 13 14:31:56.315164 systemd[1]: Started cri-containerd-827a23c6239b470c98aab789bb65c34e7a6b6d2984a2cb09ed655e53b53b1a8f.scope. Dec 13 14:31:56.339000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.339000 audit[2887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7ff0c078d7a8 items=0 ppid=2846 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832376132336336323339623437306339386161623738396262363563 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit: BPF prog-id=125 op=LOAD Dec 13 14:31:56.340000 audit[2887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c00020f298 items=0 ppid=2846 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832376132336336323339623437306339386161623738396262363563 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit: BPF prog-id=126 op=LOAD Dec 13 14:31:56.340000 audit[2887]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c00020f2e8 items=0 ppid=2846 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832376132336336323339623437306339386161623738396262363563 Dec 13 14:31:56.340000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:31:56.340000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { perfmon } for pid=2887 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit[2887]: AVC avc: denied { bpf } for pid=2887 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.340000 audit: BPF prog-id=127 op=LOAD Dec 13 14:31:56.340000 audit[2887]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c00020f378 items=0 ppid=2846 pid=2887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832376132336336323339623437306339386161623738396262363563 Dec 13 14:31:56.361758 env[1231]: time="2024-12-13T14:31:56.361695830Z" level=info msg="StartContainer for \"827a23c6239b470c98aab789bb65c34e7a6b6d2984a2cb09ed655e53b53b1a8f\" returns successfully" Dec 13 14:31:56.381013 systemd[1]: cri-containerd-827a23c6239b470c98aab789bb65c34e7a6b6d2984a2cb09ed655e53b53b1a8f.scope: Deactivated successfully. Dec 13 14:31:56.383000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:31:56.424337 env[1231]: time="2024-12-13T14:31:56.424198392Z" level=info msg="shim disconnected" id=827a23c6239b470c98aab789bb65c34e7a6b6d2984a2cb09ed655e53b53b1a8f Dec 13 14:31:56.424748 env[1231]: time="2024-12-13T14:31:56.424712606Z" level=warning msg="cleaning up after shim disconnected" id=827a23c6239b470c98aab789bb65c34e7a6b6d2984a2cb09ed655e53b53b1a8f namespace=k8s.io Dec 13 14:31:56.424920 env[1231]: time="2024-12-13T14:31:56.424895394Z" level=info msg="cleaning up dead shim" Dec 13 14:31:56.441937 env[1231]: time="2024-12-13T14:31:56.441893272Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2928 runtime=io.containerd.runc.v2\n" Dec 13 14:31:56.521944 env[1231]: time="2024-12-13T14:31:56.521891631Z" level=info msg="CreateContainer within sandbox \"55e2c8535a26f0449ec1fdf93bc7e1a33b9168000a18b09a2809781f1b180cf5\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:31:56.524902 kubelet[1565]: I1213 14:31:56.523393 1565 scope.go:117] "RemoveContainer" containerID="efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2" Dec 13 14:31:56.531563 systemd[1]: Removed slice kubepods-besteffort-pod1748f079_9014_4649_84ed_0aa8b19201e5.slice. Dec 13 14:31:56.531734 systemd[1]: kubepods-besteffort-pod1748f079_9014_4649_84ed_0aa8b19201e5.slice: Consumed 2.460s CPU time. Dec 13 14:31:56.534278 env[1231]: time="2024-12-13T14:31:56.534224990Z" level=info msg="RemoveContainer for \"efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2\"" Dec 13 14:31:56.539692 env[1231]: time="2024-12-13T14:31:56.539624888Z" level=info msg="RemoveContainer for \"efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2\" returns successfully" Dec 13 14:31:56.540540 kubelet[1565]: I1213 14:31:56.540347 1565 scope.go:117] "RemoveContainer" containerID="0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23" Dec 13 14:31:56.543388 env[1231]: time="2024-12-13T14:31:56.543338772Z" level=info msg="RemoveContainer for \"0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23\"" Dec 13 14:31:56.548113 env[1231]: time="2024-12-13T14:31:56.548060465Z" level=info msg="CreateContainer within sandbox \"55e2c8535a26f0449ec1fdf93bc7e1a33b9168000a18b09a2809781f1b180cf5\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"23d470eaac9dbbcf6c12f5b37987791e018eeb991f050ad5254b47c6f04bb005\"" Dec 13 14:31:56.550786 env[1231]: time="2024-12-13T14:31:56.549297920Z" level=info msg="StartContainer for \"23d470eaac9dbbcf6c12f5b37987791e018eeb991f050ad5254b47c6f04bb005\"" Dec 13 14:31:56.553191 env[1231]: time="2024-12-13T14:31:56.553148731Z" level=info msg="RemoveContainer for \"0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23\" returns successfully" Dec 13 14:31:56.553892 kubelet[1565]: I1213 14:31:56.553867 1565 scope.go:117] "RemoveContainer" containerID="3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e" Dec 13 14:31:56.556291 env[1231]: time="2024-12-13T14:31:56.556241823Z" level=info msg="RemoveContainer for \"3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e\"" Dec 13 14:31:56.563163 env[1231]: time="2024-12-13T14:31:56.563112263Z" level=info msg="RemoveContainer for \"3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e\" returns successfully" Dec 13 14:31:56.563451 kubelet[1565]: I1213 14:31:56.563415 1565 scope.go:117] "RemoveContainer" containerID="efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2" Dec 13 14:31:56.563947 env[1231]: time="2024-12-13T14:31:56.563815377Z" level=error msg="ContainerStatus for \"efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2\": not found" Dec 13 14:31:56.564164 kubelet[1565]: E1213 14:31:56.564142 1565 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2\": not found" containerID="efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2" Dec 13 14:31:56.564257 kubelet[1565]: I1213 14:31:56.564214 1565 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2"} err="failed to get container status \"efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2\": rpc error: code = NotFound desc = an error occurred when try to find container \"efc6bffcbb26c7c4f3e50247d56362dd65d7aed0a66cec757441f6d79e8d42d2\": not found" Dec 13 14:31:56.564257 kubelet[1565]: I1213 14:31:56.564237 1565 scope.go:117] "RemoveContainer" containerID="0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23" Dec 13 14:31:56.564650 env[1231]: time="2024-12-13T14:31:56.564578793Z" level=error msg="ContainerStatus for \"0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23\": not found" Dec 13 14:31:56.564834 kubelet[1565]: E1213 14:31:56.564815 1565 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23\": not found" containerID="0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23" Dec 13 14:31:56.564962 kubelet[1565]: I1213 14:31:56.564888 1565 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23"} err="failed to get container status \"0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23\": rpc error: code = NotFound desc = an error occurred when try to find container \"0e15e821ebbfeec7baef6a80b28cae2cc2a7bca7af82aa33ef3eb52c21a0ca23\": not found" Dec 13 14:31:56.564962 kubelet[1565]: I1213 14:31:56.564910 1565 scope.go:117] "RemoveContainer" containerID="3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e" Dec 13 14:31:56.565320 env[1231]: time="2024-12-13T14:31:56.565236620Z" level=error msg="ContainerStatus for \"3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e\": not found" Dec 13 14:31:56.565505 kubelet[1565]: E1213 14:31:56.565482 1565 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e\": not found" containerID="3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e" Dec 13 14:31:56.565603 kubelet[1565]: I1213 14:31:56.565532 1565 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e"} err="failed to get container status \"3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e\": rpc error: code = NotFound desc = an error occurred when try to find container \"3840bb07e3837981ef5062a4dc20334691e6b850af4b797404be34ca52bae87e\": not found" Dec 13 14:31:56.595583 systemd[1]: Started cri-containerd-23d470eaac9dbbcf6c12f5b37987791e018eeb991f050ad5254b47c6f04bb005.scope. Dec 13 14:31:56.620608 systemd[1]: var-lib-kubelet-pods-1748f079\x2d9014\x2d4649\x2d84ed\x2d0aa8b19201e5-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. Dec 13 14:31:56.620803 systemd[1]: var-lib-kubelet-pods-1748f079\x2d9014\x2d4649\x2d84ed\x2d0aa8b19201e5-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dk96p2.mount: Deactivated successfully. Dec 13 14:31:56.620948 systemd[1]: var-lib-kubelet-pods-1748f079\x2d9014\x2d4649\x2d84ed\x2d0aa8b19201e5-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Dec 13 14:31:56.645000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.645000 audit[2953]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f58803eb258 items=0 ppid=2846 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643437306561616339646262636636633132663562333739383737 Dec 13 14:31:56.646000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.646000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.646000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.646000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.646000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.646000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.646000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.646000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.646000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.646000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.646000 audit: BPF prog-id=128 op=LOAD Dec 13 14:31:56.646000 audit[2953]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003006a8 items=0 ppid=2846 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643437306561616339646262636636633132663562333739383737 Dec 13 14:31:56.648000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.648000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.648000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.648000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.648000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.648000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.648000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.648000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.648000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.648000 audit: BPF prog-id=129 op=LOAD Dec 13 14:31:56.648000 audit[2953]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003006f8 items=0 ppid=2846 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643437306561616339646262636636633132663562333739383737 Dec 13 14:31:56.649000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:31:56.649000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:31:56.649000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.649000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.649000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.649000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.649000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.649000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.649000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.649000 audit[2953]: AVC avc: denied { perfmon } for pid=2953 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.649000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.649000 audit[2953]: AVC avc: denied { bpf } for pid=2953 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:56.649000 audit: BPF prog-id=130 op=LOAD Dec 13 14:31:56.649000 audit[2953]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000300788 items=0 ppid=2846 pid=2953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:56.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643437306561616339646262636636633132663562333739383737 Dec 13 14:31:56.697293 env[1231]: time="2024-12-13T14:31:56.697162612Z" level=info msg="StartContainer for \"23d470eaac9dbbcf6c12f5b37987791e018eeb991f050ad5254b47c6f04bb005\" returns successfully" Dec 13 14:31:57.211789 kubelet[1565]: E1213 14:31:57.211706 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:57.384196 kubelet[1565]: I1213 14:31:57.384157 1565 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="1748f079-9014-4649-84ed-0aa8b19201e5" path="/var/lib/kubelet/pods/1748f079-9014-4649-84ed-0aa8b19201e5/volumes" Dec 13 14:31:58.052104 systemd[1]: cri-containerd-23d470eaac9dbbcf6c12f5b37987791e018eeb991f050ad5254b47c6f04bb005.scope: Deactivated successfully. Dec 13 14:31:58.052443 systemd[1]: cri-containerd-23d470eaac9dbbcf6c12f5b37987791e018eeb991f050ad5254b47c6f04bb005.scope: Consumed 1.314s CPU time. Dec 13 14:31:58.069948 kernel: kauditd_printk_skb: 365 callbacks suppressed Dec 13 14:31:58.070133 kernel: audit: type=1334 audit(1734100318.055:766): prog-id=130 op=UNLOAD Dec 13 14:31:58.055000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:31:58.103239 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-23d470eaac9dbbcf6c12f5b37987791e018eeb991f050ad5254b47c6f04bb005-rootfs.mount: Deactivated successfully. Dec 13 14:31:58.212459 kubelet[1565]: E1213 14:31:58.212387 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:58.308681 env[1231]: time="2024-12-13T14:31:58.308502032Z" level=info msg="shim disconnected" id=23d470eaac9dbbcf6c12f5b37987791e018eeb991f050ad5254b47c6f04bb005 Dec 13 14:31:58.308681 env[1231]: time="2024-12-13T14:31:58.308578061Z" level=warning msg="cleaning up after shim disconnected" id=23d470eaac9dbbcf6c12f5b37987791e018eeb991f050ad5254b47c6f04bb005 namespace=k8s.io Dec 13 14:31:58.308681 env[1231]: time="2024-12-13T14:31:58.308591767Z" level=info msg="cleaning up dead shim" Dec 13 14:31:58.313193 env[1231]: time="2024-12-13T14:31:58.313140396Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:58.317665 env[1231]: time="2024-12-13T14:31:58.317616811Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:58.321899 env[1231]: time="2024-12-13T14:31:58.321809479Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:58.323221 env[1231]: time="2024-12-13T14:31:58.323167937Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:31:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2994 runtime=io.containerd.runc.v2\n" Dec 13 14:31:58.324294 env[1231]: time="2024-12-13T14:31:58.324243902Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:58.324640 env[1231]: time="2024-12-13T14:31:58.324590999Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:31:58.329983 env[1231]: time="2024-12-13T14:31:58.327053195Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:31:58.351062 env[1231]: time="2024-12-13T14:31:58.350818247Z" level=info msg="CreateContainer within sandbox \"b06cea7b0b620a369d4a6fa413f3c924f2d85d8593c2c19c233e9e6cb104c532\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:31:58.370141 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3475486238.mount: Deactivated successfully. Dec 13 14:31:58.376150 env[1231]: time="2024-12-13T14:31:58.376076088Z" level=info msg="CreateContainer within sandbox \"b06cea7b0b620a369d4a6fa413f3c924f2d85d8593c2c19c233e9e6cb104c532\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"97049517554db22a8e31b23b61052cc1686969749ee11ebfd8158f7716102ed3\"" Dec 13 14:31:58.377118 env[1231]: time="2024-12-13T14:31:58.377061444Z" level=info msg="StartContainer for \"97049517554db22a8e31b23b61052cc1686969749ee11ebfd8158f7716102ed3\"" Dec 13 14:31:58.401922 systemd[1]: Started cri-containerd-97049517554db22a8e31b23b61052cc1686969749ee11ebfd8158f7716102ed3.scope. Dec 13 14:31:58.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.464649 kernel: audit: type=1400 audit(1734100318.422:767): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.464865 kernel: audit: type=1400 audit(1734100318.422:768): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.464919 kernel: audit: type=1400 audit(1734100318.422:769): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.529533 kernel: audit: type=1400 audit(1734100318.422:770): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.529733 kernel: audit: type=1400 audit(1734100318.422:771): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.551871 kernel: audit: type=1400 audit(1734100318.422:772): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.574612 kernel: audit: type=1400 audit(1734100318.422:773): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.595133 env[1231]: time="2024-12-13T14:31:58.583136828Z" level=info msg="CreateContainer within sandbox \"55e2c8535a26f0449ec1fdf93bc7e1a33b9168000a18b09a2809781f1b180cf5\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:31:58.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.621739 kernel: audit: type=1400 audit(1734100318.422:774): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.621943 kernel: audit: type=1400 audit(1734100318.422:775): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.422000 audit: BPF prog-id=131 op=LOAD Dec 13 14:31:58.432000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.432000 audit[3016]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2653 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:58.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937303439353137353534646232326138653331623233623631303532 Dec 13 14:31:58.432000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.432000 audit[3016]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2653 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:58.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937303439353137353534646232326138653331623233623631303532 Dec 13 14:31:58.432000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.432000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.432000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.432000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.432000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.432000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.432000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.432000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.432000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.432000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.432000 audit: BPF prog-id=132 op=LOAD Dec 13 14:31:58.432000 audit[3016]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000300e40 items=0 ppid=2653 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:58.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937303439353137353534646232326138653331623233623631303532 Dec 13 14:31:58.443000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.443000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.443000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.443000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.443000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.443000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.443000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.443000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.443000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.443000 audit: BPF prog-id=133 op=LOAD Dec 13 14:31:58.443000 audit[3016]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000300e88 items=0 ppid=2653 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:58.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937303439353137353534646232326138653331623233623631303532 Dec 13 14:31:58.484000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:31:58.484000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:31:58.485000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.485000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.485000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.485000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.485000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.485000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.485000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.485000 audit[3016]: AVC avc: denied { perfmon } for pid=3016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.485000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.485000 audit[3016]: AVC avc: denied { bpf } for pid=3016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.485000 audit: BPF prog-id=134 op=LOAD Dec 13 14:31:58.485000 audit[3016]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000301298 items=0 ppid=2653 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:58.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937303439353137353534646232326138653331623233623631303532 Dec 13 14:31:58.631259 env[1231]: time="2024-12-13T14:31:58.630645612Z" level=info msg="StartContainer for \"97049517554db22a8e31b23b61052cc1686969749ee11ebfd8158f7716102ed3\" returns successfully" Dec 13 14:31:58.634927 env[1231]: time="2024-12-13T14:31:58.633451190Z" level=info msg="CreateContainer within sandbox \"55e2c8535a26f0449ec1fdf93bc7e1a33b9168000a18b09a2809781f1b180cf5\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"231101ad148f3e7b0de7fa5068792e7c9c8eafa2058f205e297eb8567c1a1863\"" Dec 13 14:31:58.634927 env[1231]: time="2024-12-13T14:31:58.634182512Z" level=info msg="StartContainer for \"231101ad148f3e7b0de7fa5068792e7c9c8eafa2058f205e297eb8567c1a1863\"" Dec 13 14:31:58.661438 systemd[1]: Started cri-containerd-231101ad148f3e7b0de7fa5068792e7c9c8eafa2058f205e297eb8567c1a1863.scope. Dec 13 14:31:58.703000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.703000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f709418f978 items=0 ppid=2846 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:58.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233313130316164313438663365376230646537666135303638373932 Dec 13 14:31:58.703000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.703000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.703000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.703000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.703000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.703000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.703000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.703000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.703000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.703000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.703000 audit: BPF prog-id=135 op=LOAD Dec 13 14:31:58.703000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000380f98 items=0 ppid=2846 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:58.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233313130316164313438663365376230646537666135303638373932 Dec 13 14:31:58.704000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.704000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.704000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.704000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.704000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.704000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.704000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.704000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.704000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.704000 audit: BPF prog-id=136 op=LOAD Dec 13 14:31:58.704000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000380fe8 items=0 ppid=2846 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:58.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233313130316164313438663365376230646537666135303638373932 Dec 13 14:31:58.704000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:31:58.704000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:31:58.704000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.704000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.704000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.704000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.704000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.704000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.704000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.704000 audit[3056]: AVC avc: denied { perfmon } for pid=3056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.704000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.704000 audit[3056]: AVC avc: denied { bpf } for pid=3056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:31:58.704000 audit: BPF prog-id=137 op=LOAD Dec 13 14:31:58.704000 audit[3056]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000381078 items=0 ppid=2846 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:58.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233313130316164313438663365376230646537666135303638373932 Dec 13 14:31:58.732526 env[1231]: time="2024-12-13T14:31:58.732471080Z" level=info msg="StartContainer for \"231101ad148f3e7b0de7fa5068792e7c9c8eafa2058f205e297eb8567c1a1863\" returns successfully" Dec 13 14:31:58.738000 audit[3084]: NETFILTER_CFG table=filter:78 family=2 entries=9 op=nft_register_rule pid=3084 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:58.738000 audit[3084]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc43823d60 a2=0 a3=7ffc43823d4c items=0 ppid=1716 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:58.738000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:58.744000 audit[3084]: NETFILTER_CFG table=nat:79 family=2 entries=27 op=nft_unregister_chain pid=3084 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:58.744000 audit[3084]: SYSCALL arch=c000003e syscall=46 success=yes exit=6028 a0=3 a1=7ffc43823d60 a2=0 a3=7ffc43823d4c items=0 ppid=1716 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:58.744000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:59.213424 kubelet[1565]: E1213 14:31:59.213348 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:31:59.580051 kubelet[1565]: I1213 14:31:59.579561 1565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-86674b4688-xmgsd" podStartSLOduration=2.28239105 podStartE2EDuration="6.579506547s" podCreationTimestamp="2024-12-13 14:31:53 +0000 UTC" firstStartedPulling="2024-12-13 14:31:54.028559124 +0000 UTC m=+31.664328843" lastFinishedPulling="2024-12-13 14:31:58.325674615 +0000 UTC m=+35.961444340" observedRunningTime="2024-12-13 14:31:59.579125942 +0000 UTC m=+37.214895678" watchObservedRunningTime="2024-12-13 14:31:59.579506547 +0000 UTC m=+37.215276275" Dec 13 14:31:59.610000 audit[3113]: NETFILTER_CFG table=filter:80 family=2 entries=9 op=nft_register_rule pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:59.610000 audit[3113]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe18fff4d0 a2=0 a3=7ffe18fff4bc items=0 ppid=1716 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.610000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:59.613000 audit[3113]: NETFILTER_CFG table=nat:81 family=2 entries=27 op=nft_register_chain pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:31:59.613000 audit[3113]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe18fff4d0 a2=0 a3=7ffe18fff4bc items=0 ppid=1716 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:59.613000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:31:59.624173 kubelet[1565]: I1213 14:31:59.623790 1565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-4zwlw" podStartSLOduration=4.62372613 podStartE2EDuration="4.62372613s" podCreationTimestamp="2024-12-13 14:31:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:31:59.622987193 +0000 UTC m=+37.258756954" watchObservedRunningTime="2024-12-13 14:31:59.62372613 +0000 UTC m=+37.259495867" Dec 13 14:31:59.678329 systemd[1]: run-containerd-runc-k8s.io-231101ad148f3e7b0de7fa5068792e7c9c8eafa2058f205e297eb8567c1a1863-runc.bt4URc.mount: Deactivated successfully. Dec 13 14:32:00.213970 kubelet[1565]: E1213 14:32:00.213876 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:00.221000 audit[3168]: AVC avc: denied { write } for pid=3168 comm="tee" name="fd" dev="proc" ino=22347 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:00.221000 audit[3168]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec75c39e3 a2=241 a3=1b6 items=1 ppid=3143 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.221000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:32:00.221000 audit: PATH item=0 name="/dev/fd/63" inode=22334 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:00.221000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:00.284000 audit[3183]: AVC avc: denied { write } for pid=3183 comm="tee" name="fd" dev="proc" ino=22388 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:00.289000 audit[3181]: AVC avc: denied { write } for pid=3181 comm="tee" name="fd" dev="proc" ino=22789 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:00.289000 audit[3181]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd200c9f3 a2=241 a3=1b6 items=1 ppid=3163 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.289000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:32:00.289000 audit: PATH item=0 name="/dev/fd/63" inode=22371 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:00.289000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:00.295000 audit[3185]: AVC avc: denied { write } for pid=3185 comm="tee" name="fd" dev="proc" ino=22391 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:00.298000 audit[3187]: AVC avc: denied { write } for pid=3187 comm="tee" name="fd" dev="proc" ino=22394 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:00.302000 audit[3192]: AVC avc: denied { write } for pid=3192 comm="tee" name="fd" dev="proc" ino=22793 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:00.302000 audit[3192]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe7dfc49e4 a2=241 a3=1b6 items=1 ppid=3145 pid=3192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.302000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:32:00.302000 audit: PATH item=0 name="/dev/fd/63" inode=22382 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:00.302000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:00.284000 audit[3183]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff5ff909f3 a2=241 a3=1b6 items=1 ppid=3147 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.284000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:32:00.284000 audit: PATH item=0 name="/dev/fd/63" inode=22374 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:00.284000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:00.321000 audit[3190]: AVC avc: denied { write } for pid=3190 comm="tee" name="fd" dev="proc" ino=22403 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:32:00.295000 audit[3185]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd78fd29f4 a2=241 a3=1b6 items=1 ppid=3153 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.295000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:32:00.295000 audit: PATH item=0 name="/dev/fd/63" inode=22377 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:00.295000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:00.298000 audit[3187]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea29579f3 a2=241 a3=1b6 items=1 ppid=3149 pid=3187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.298000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:32:00.298000 audit: PATH item=0 name="/dev/fd/63" inode=22378 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:00.298000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:00.321000 audit[3190]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff81d899f5 a2=241 a3=1b6 items=1 ppid=3159 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.321000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:32:00.321000 audit: PATH item=0 name="/dev/fd/63" inode=22381 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:00.321000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:32:00.674152 systemd[1]: run-containerd-runc-k8s.io-231101ad148f3e7b0de7fa5068792e7c9c8eafa2058f205e297eb8567c1a1863-runc.Gv7kPH.mount: Deactivated successfully. Dec 13 14:32:00.973000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.973000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.973000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.973000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.973000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.973000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.973000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.973000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.973000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.973000 audit: BPF prog-id=138 op=LOAD Dec 13 14:32:00.973000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd18c66b90 a2=98 a3=3 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.973000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:00.975000 audit: BPF prog-id=138 op=UNLOAD Dec 13 14:32:00.976000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.976000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.976000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.976000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.976000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.976000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.976000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.976000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.976000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.976000 audit: BPF prog-id=139 op=LOAD Dec 13 14:32:00.976000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd18c66970 a2=74 a3=540051 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.976000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:00.977000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:32:00.977000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.977000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.977000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.977000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.977000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.977000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.977000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.977000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.977000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:00.977000 audit: BPF prog-id=140 op=LOAD Dec 13 14:32:00.977000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd18c669a0 a2=94 a3=2 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:00.977000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:00.978000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:32:01.212000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.212000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.212000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.212000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.212000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.212000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.212000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.212000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.214794 kubelet[1565]: E1213 14:32:01.214695 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:01.212000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.212000 audit: BPF prog-id=141 op=LOAD Dec 13 14:32:01.212000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd18c66860 a2=40 a3=1 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.212000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.216000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:32:01.216000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.216000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd18c66930 a2=50 a3=7ffd18c66a10 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.216000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.233000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.233000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd18c66870 a2=28 a3=0 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.233000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.236000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.236000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd18c668a0 a2=28 a3=0 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.236000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.237000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.237000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd18c667b0 a2=28 a3=0 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.237000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.237000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.237000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd18c668c0 a2=28 a3=0 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.237000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.238000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.238000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd18c668a0 a2=28 a3=0 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.238000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.238000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.238000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd18c66890 a2=28 a3=0 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.238000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.238000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.238000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd18c668c0 a2=28 a3=0 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.238000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.239000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.239000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd18c668a0 a2=28 a3=0 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.239000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.239000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.239000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd18c668c0 a2=28 a3=0 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.239000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.239000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.239000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd18c66890 a2=28 a3=0 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.239000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.240000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.240000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd18c66900 a2=28 a3=0 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.240000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.240000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd18c666b0 a2=50 a3=1 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.240000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.241000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.241000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.241000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.241000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.241000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.241000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.241000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.241000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.241000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.241000 audit: BPF prog-id=142 op=LOAD Dec 13 14:32:01.241000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd18c666b0 a2=94 a3=5 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.241000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:32:01.241000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.241000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd18c66760 a2=50 a3=1 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.241000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.241000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd18c66880 a2=4 a3=38 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.241000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { confidentiality } for pid=3274 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:01.242000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd18c668d0 a2=94 a3=6 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.242000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { confidentiality } for pid=3274 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:01.242000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd18c66080 a2=94 a3=83 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.242000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { perfmon } for pid=3274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { bpf } for pid=3274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.242000 audit[3274]: AVC avc: denied { confidentiality } for pid=3274 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:01.242000 audit[3274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd18c66080 a2=94 a3=83 items=0 ppid=3164 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.242000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit: BPF prog-id=143 op=LOAD Dec 13 14:32:01.267000 audit[3279]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff20d7f820 a2=98 a3=1999999999999999 items=0 ppid=3164 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.267000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:32:01.267000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit: BPF prog-id=144 op=LOAD Dec 13 14:32:01.267000 audit[3279]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff20d7f700 a2=74 a3=ffff items=0 ppid=3164 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.267000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:32:01.267000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.267000 audit: BPF prog-id=145 op=LOAD Dec 13 14:32:01.267000 audit[3279]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff20d7f740 a2=40 a3=7fff20d7f920 items=0 ppid=3164 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.267000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:32:01.268000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:32:01.439000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.439000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.439000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.439000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.439000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.439000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.439000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.439000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.439000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.439000 audit: BPF prog-id=146 op=LOAD Dec 13 14:32:01.439000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff2b460a0 a2=98 a3=ffffffff items=0 ppid=3164 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.439000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:01.440000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:32:01.440000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.440000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.440000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.440000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.440000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.440000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.440000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.440000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.440000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.440000 audit: BPF prog-id=147 op=LOAD Dec 13 14:32:01.440000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff2b45eb0 a2=74 a3=540051 items=0 ppid=3164 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.440000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:01.443000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:32:01.443000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.443000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.443000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.443000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.443000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.443000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.443000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.443000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.443000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.443000 audit: BPF prog-id=148 op=LOAD Dec 13 14:32:01.443000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff2b45ee0 a2=94 a3=2 items=0 ppid=3164 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.443000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:01.443000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:32:01.443000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.443000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffff2b45db0 a2=28 a3=0 items=0 ppid=3164 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.443000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:01.443000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.443000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff2b45de0 a2=28 a3=0 items=0 ppid=3164 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.443000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:01.444000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.444000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff2b45cf0 a2=28 a3=0 items=0 ppid=3164 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:01.444000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.444000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffff2b45e00 a2=28 a3=0 items=0 ppid=3164 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:01.444000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.444000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffff2b45de0 a2=28 a3=0 items=0 ppid=3164 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.444000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:01.445000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.445000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffff2b45dd0 a2=28 a3=0 items=0 ppid=3164 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.445000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:01.445000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.445000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffff2b45e00 a2=28 a3=0 items=0 ppid=3164 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.445000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:01.445000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.445000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff2b45de0 a2=28 a3=0 items=0 ppid=3164 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.445000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:01.445000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.445000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff2b45e00 a2=28 a3=0 items=0 ppid=3164 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.445000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:01.446000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.446000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffff2b45dd0 a2=28 a3=0 items=0 ppid=3164 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.446000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:01.446000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.446000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffff2b45e40 a2=28 a3=0 items=0 ppid=3164 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.446000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:01.446000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.446000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.446000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.446000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.446000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.446000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.446000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.446000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.446000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.446000 audit: BPF prog-id=149 op=LOAD Dec 13 14:32:01.446000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffff2b45cb0 a2=40 a3=0 items=0 ppid=3164 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.446000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:01.447000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:32:01.447000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.447000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffff2b45ca0 a2=50 a3=2800 items=0 ppid=3164 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.447000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffff2b45ca0 a2=50 a3=2800 items=0 ppid=3164 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.453000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit: BPF prog-id=150 op=LOAD Dec 13 14:32:01.453000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffff2b454c0 a2=94 a3=2 items=0 ppid=3164 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.453000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:01.453000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.453000 audit: BPF prog-id=151 op=LOAD Dec 13 14:32:01.453000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffff2b455c0 a2=94 a3=2d items=0 ppid=3164 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.453000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:32:01.459000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.459000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.459000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.459000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.459000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.459000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.459000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.459000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.459000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.459000 audit: BPF prog-id=152 op=LOAD Dec 13 14:32:01.459000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcbe1491c0 a2=98 a3=0 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.459000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.460000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:32:01.460000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.460000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.460000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.460000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.460000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.460000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.460000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.460000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.460000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.460000 audit: BPF prog-id=153 op=LOAD Dec 13 14:32:01.460000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbe148fa0 a2=74 a3=540051 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.460000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.460000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:32:01.460000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.460000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.460000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.460000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.460000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.460000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.460000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.460000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.460000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.460000 audit: BPF prog-id=154 op=LOAD Dec 13 14:32:01.460000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbe148fd0 a2=94 a3=2 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.460000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.460000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:32:01.718000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.718000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.718000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.718000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.718000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.718000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.718000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.718000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.718000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.718000 audit: BPF prog-id=155 op=LOAD Dec 13 14:32:01.718000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbe148e90 a2=40 a3=1 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.718000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.720000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:32:01.720000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.720000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcbe148f60 a2=50 a3=7ffcbe149040 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.720000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.738000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.738000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbe148ea0 a2=28 a3=0 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.738000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.739000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.739000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbe148ed0 a2=28 a3=0 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.739000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.739000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.739000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbe148de0 a2=28 a3=0 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.739000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.740000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.740000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbe148ef0 a2=28 a3=0 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.740000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.740000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.740000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbe148ed0 a2=28 a3=0 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.740000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.740000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.740000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbe148ec0 a2=28 a3=0 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.740000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.741000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.741000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbe148ef0 a2=28 a3=0 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.741000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.741000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.741000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbe148ed0 a2=28 a3=0 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.741000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.741000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.741000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbe148ef0 a2=28 a3=0 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.741000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.742000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.742000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbe148ec0 a2=28 a3=0 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.742000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.742000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.742000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbe148f30 a2=28 a3=0 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.742000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.743000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.743000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcbe148ce0 a2=50 a3=1 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.743000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.743000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.743000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.743000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.743000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.743000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.743000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.743000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.743000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.743000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.743000 audit: BPF prog-id=156 op=LOAD Dec 13 14:32:01.743000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcbe148ce0 a2=94 a3=5 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.743000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.744000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:32:01.744000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.744000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcbe148d90 a2=50 a3=1 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.744000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.744000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.744000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcbe148eb0 a2=4 a3=38 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.744000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.744000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.744000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.744000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.744000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.744000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.744000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.744000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.744000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.744000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.744000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.744000 audit[3309]: AVC avc: denied { confidentiality } for pid=3309 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:01.744000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcbe148f00 a2=94 a3=6 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.744000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.745000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.745000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.745000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.745000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.745000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.745000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.745000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.745000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.745000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.745000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.745000 audit[3309]: AVC avc: denied { confidentiality } for pid=3309 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:01.745000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcbe1486b0 a2=94 a3=83 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.745000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.747000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.747000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.747000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.747000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.747000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.747000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.747000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.747000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.747000 audit[3309]: AVC avc: denied { perfmon } for pid=3309 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.747000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.747000 audit[3309]: AVC avc: denied { confidentiality } for pid=3309 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:01.747000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcbe1486b0 a2=94 a3=83 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.747000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.747000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.747000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcbe14a0f0 a2=10 a3=f1f00800 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.747000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.748000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.748000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcbe149f90 a2=10 a3=3 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.748000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.748000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcbe149f30 a2=10 a3=3 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.748000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:01.748000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcbe149f30 a2=10 a3=7 items=0 ppid=3164 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.748000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:32:01.757000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:32:01.755929 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2785187197.mount: Deactivated successfully. Dec 13 14:32:01.862000 audit[3339]: NETFILTER_CFG table=filter:82 family=2 entries=38 op=nft_register_chain pid=3339 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:32:01.862000 audit[3339]: SYSCALL arch=c000003e syscall=46 success=yes exit=20600 a0=3 a1=7ffe28338940 a2=0 a3=7ffe2833892c items=0 ppid=3164 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:01.862000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:32:02.215728 kubelet[1565]: E1213 14:32:02.215676 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:03.172417 kubelet[1565]: E1213 14:32:03.172341 1565 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:03.216686 kubelet[1565]: E1213 14:32:03.216588 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:03.617734 env[1231]: time="2024-12-13T14:32:03.617659012Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:03.621272 env[1231]: time="2024-12-13T14:32:03.621220355Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:03.623970 env[1231]: time="2024-12-13T14:32:03.623926174Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:03.626774 env[1231]: time="2024-12-13T14:32:03.626727568Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:03.628053 env[1231]: time="2024-12-13T14:32:03.628005243Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:32:03.632150 env[1231]: time="2024-12-13T14:32:03.631370951Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:32:03.633287 env[1231]: time="2024-12-13T14:32:03.633230230Z" level=info msg="CreateContainer within sandbox \"873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:32:03.658093 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3205335479.mount: Deactivated successfully. Dec 13 14:32:03.666948 env[1231]: time="2024-12-13T14:32:03.666871081Z" level=info msg="CreateContainer within sandbox \"873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"9372496013b6db3960d629ef08ddc95d9af015576c8ec8b7209f40c667d6d8ba\"" Dec 13 14:32:03.667757 env[1231]: time="2024-12-13T14:32:03.667703041Z" level=info msg="StartContainer for \"9372496013b6db3960d629ef08ddc95d9af015576c8ec8b7209f40c667d6d8ba\"" Dec 13 14:32:03.706522 systemd[1]: Started cri-containerd-9372496013b6db3960d629ef08ddc95d9af015576c8ec8b7209f40c667d6d8ba.scope. Dec 13 14:32:03.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.732086 kernel: kauditd_printk_skb: 609 callbacks suppressed Dec 13 14:32:03.732154 kernel: audit: type=1400 audit(1734100323.724:894): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.773178 kernel: audit: type=1400 audit(1734100323.724:895): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.794012 kernel: audit: type=1400 audit(1734100323.724:896): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.815292 kernel: audit: type=1400 audit(1734100323.724:897): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.836895 kernel: audit: type=1400 audit(1734100323.724:898): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.879541 kernel: audit: type=1400 audit(1734100323.724:899): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.879700 kernel: audit: type=1400 audit(1734100323.724:900): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.881740 kernel: audit: type=1400 audit(1734100323.724:901): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.907896 kernel: audit: type=1400 audit(1734100323.724:902): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.919245 env[1231]: time="2024-12-13T14:32:03.919186317Z" level=info msg="StartContainer for \"9372496013b6db3960d629ef08ddc95d9af015576c8ec8b7209f40c667d6d8ba\" returns successfully" Dec 13 14:32:03.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.943037 kernel: audit: type=1400 audit(1734100323.751:903): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.751000 audit: BPF prog-id=157 op=LOAD Dec 13 14:32:03.751000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.751000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2721 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:03.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933373234393630313362366462333936306436323965663038646463 Dec 13 14:32:03.751000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.751000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2721 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:03.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933373234393630313362366462333936306436323965663038646463 Dec 13 14:32:03.751000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.751000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.751000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.751000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.751000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.751000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.751000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.751000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.751000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.751000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.751000 audit: BPF prog-id=158 op=LOAD Dec 13 14:32:03.751000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002814c0 items=0 ppid=2721 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:03.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933373234393630313362366462333936306436323965663038646463 Dec 13 14:32:03.771000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.771000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.771000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.771000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.771000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.771000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.771000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.771000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.771000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.771000 audit: BPF prog-id=159 op=LOAD Dec 13 14:32:03.771000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000281508 items=0 ppid=2721 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:03.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933373234393630313362366462333936306436323965663038646463 Dec 13 14:32:03.793000 audit: BPF prog-id=159 op=UNLOAD Dec 13 14:32:03.793000 audit: BPF prog-id=158 op=UNLOAD Dec 13 14:32:03.793000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.793000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.793000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.793000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.793000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.793000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.793000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.793000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.793000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.793000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:03.793000 audit: BPF prog-id=160 op=LOAD Dec 13 14:32:03.793000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000281918 items=0 ppid=2721 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:03.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933373234393630313362366462333936306436323965663038646463 Dec 13 14:32:04.217454 kubelet[1565]: E1213 14:32:04.217292 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:04.860483 env[1231]: time="2024-12-13T14:32:04.860405241Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:04.863814 env[1231]: time="2024-12-13T14:32:04.863753402Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:04.866558 env[1231]: time="2024-12-13T14:32:04.866498653Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:04.869066 env[1231]: time="2024-12-13T14:32:04.868996305Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:04.869999 env[1231]: time="2024-12-13T14:32:04.869950463Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:32:04.873348 env[1231]: time="2024-12-13T14:32:04.873285903Z" level=info msg="CreateContainer within sandbox \"bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:32:04.899811 env[1231]: time="2024-12-13T14:32:04.899746083Z" level=info msg="CreateContainer within sandbox \"bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"9e46b594e19ea4a5c4cd174832507ad207631c970db28b8ef5d30d56181abaaa\"" Dec 13 14:32:04.900733 env[1231]: time="2024-12-13T14:32:04.900678515Z" level=info msg="StartContainer for \"9e46b594e19ea4a5c4cd174832507ad207631c970db28b8ef5d30d56181abaaa\"" Dec 13 14:32:04.944126 systemd[1]: run-containerd-runc-k8s.io-9e46b594e19ea4a5c4cd174832507ad207631c970db28b8ef5d30d56181abaaa-runc.zJz8SL.mount: Deactivated successfully. Dec 13 14:32:04.950655 systemd[1]: Started cri-containerd-9e46b594e19ea4a5c4cd174832507ad207631c970db28b8ef5d30d56181abaaa.scope. Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f41891a2cb8 items=0 ppid=2499 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:04.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965343662353934653139656134613563346364313734383332353037 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit: BPF prog-id=161 op=LOAD Dec 13 14:32:04.974000 audit[3403]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001bc798 items=0 ppid=2499 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:04.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965343662353934653139656134613563346364313734383332353037 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit: BPF prog-id=162 op=LOAD Dec 13 14:32:04.974000 audit[3403]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001bc7e8 items=0 ppid=2499 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:04.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965343662353934653139656134613563346364313734383332353037 Dec 13 14:32:04.974000 audit: BPF prog-id=162 op=UNLOAD Dec 13 14:32:04.974000 audit: BPF prog-id=161 op=UNLOAD Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { perfmon } for pid=3403 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit[3403]: AVC avc: denied { bpf } for pid=3403 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:04.974000 audit: BPF prog-id=163 op=LOAD Dec 13 14:32:04.974000 audit[3403]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001bc878 items=0 ppid=2499 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:04.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965343662353934653139656134613563346364313734383332353037 Dec 13 14:32:05.000924 env[1231]: time="2024-12-13T14:32:05.000835460Z" level=info msg="StartContainer for \"9e46b594e19ea4a5c4cd174832507ad207631c970db28b8ef5d30d56181abaaa\" returns successfully" Dec 13 14:32:05.218417 kubelet[1565]: E1213 14:32:05.218262 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:05.359550 kubelet[1565]: I1213 14:32:05.359101 1565 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:32:05.359550 kubelet[1565]: I1213 14:32:05.359150 1565 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:32:05.607800 kubelet[1565]: I1213 14:32:05.607753 1565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-98848" podStartSLOduration=30.597441201 podStartE2EDuration="42.607696311s" podCreationTimestamp="2024-12-13 14:31:23 +0000 UTC" firstStartedPulling="2024-12-13 14:31:52.860209355 +0000 UTC m=+30.495979078" lastFinishedPulling="2024-12-13 14:32:04.87046447 +0000 UTC m=+42.506234188" observedRunningTime="2024-12-13 14:32:05.606446559 +0000 UTC m=+43.242216295" watchObservedRunningTime="2024-12-13 14:32:05.607696311 +0000 UTC m=+43.243466046" Dec 13 14:32:05.608138 kubelet[1565]: I1213 14:32:05.607998 1565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-sfg5f" podStartSLOduration=19.554249131 podStartE2EDuration="28.607943127s" podCreationTimestamp="2024-12-13 14:31:37 +0000 UTC" firstStartedPulling="2024-12-13 14:31:54.574814702 +0000 UTC m=+32.210584416" lastFinishedPulling="2024-12-13 14:32:03.628508687 +0000 UTC m=+41.264278412" observedRunningTime="2024-12-13 14:32:04.597817444 +0000 UTC m=+42.233587180" watchObservedRunningTime="2024-12-13 14:32:05.607943127 +0000 UTC m=+43.243712864" Dec 13 14:32:06.219223 kubelet[1565]: E1213 14:32:06.219132 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:07.219952 kubelet[1565]: E1213 14:32:07.219879 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:08.220431 kubelet[1565]: E1213 14:32:08.220360 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:09.221651 kubelet[1565]: E1213 14:32:09.221574 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:10.070000 audit[3443]: NETFILTER_CFG table=filter:83 family=2 entries=20 op=nft_register_rule pid=3443 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:10.076794 kernel: kauditd_printk_skb: 90 callbacks suppressed Dec 13 14:32:10.076964 kernel: audit: type=1325 audit(1734100330.070:918): table=filter:83 family=2 entries=20 op=nft_register_rule pid=3443 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:10.094904 kernel: audit: type=1300 audit(1734100330.070:918): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff87407c20 a2=0 a3=7fff87407c0c items=0 ppid=1716 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.070000 audit[3443]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff87407c20 a2=0 a3=7fff87407c0c items=0 ppid=1716 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.129059 kernel: audit: type=1327 audit(1734100330.070:918): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:10.070000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:10.155900 kernel: audit: type=1325 audit(1734100330.126:919): table=nat:84 family=2 entries=22 op=nft_register_rule pid=3443 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:10.126000 audit[3443]: NETFILTER_CFG table=nat:84 family=2 entries=22 op=nft_register_rule pid=3443 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:10.156151 kubelet[1565]: I1213 14:32:10.143378 1565 topology_manager.go:215] "Topology Admit Handler" podUID="02a85e51-d0ed-4120-a8d6-b1b3595d0ba4" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 14:32:10.152232 systemd[1]: Created slice kubepods-besteffort-pod02a85e51_d0ed_4120_a8d6_b1b3595d0ba4.slice. Dec 13 14:32:10.126000 audit[3443]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff87407c20 a2=0 a3=0 items=0 ppid=1716 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.190487 kernel: audit: type=1300 audit(1734100330.126:919): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff87407c20 a2=0 a3=0 items=0 ppid=1716 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.203534 kernel: audit: type=1327 audit(1734100330.126:919): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:10.126000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:10.199000 audit[3445]: NETFILTER_CFG table=filter:85 family=2 entries=32 op=nft_register_rule pid=3445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:10.222506 kubelet[1565]: E1213 14:32:10.222448 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:10.223099 kernel: audit: type=1325 audit(1734100330.199:920): table=filter:85 family=2 entries=32 op=nft_register_rule pid=3445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:10.223153 kernel: audit: type=1300 audit(1734100330.199:920): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff059b76c0 a2=0 a3=7fff059b76ac items=0 ppid=1716 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.199000 audit[3445]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff059b76c0 a2=0 a3=7fff059b76ac items=0 ppid=1716 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.258018 kernel: audit: type=1327 audit(1734100330.199:920): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:10.199000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:10.273000 audit[3445]: NETFILTER_CFG table=nat:86 family=2 entries=22 op=nft_register_rule pid=3445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:10.273000 audit[3445]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff059b76c0 a2=0 a3=0 items=0 ppid=1716 pid=3445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.291872 kernel: audit: type=1325 audit(1734100330.273:921): table=nat:86 family=2 entries=22 op=nft_register_rule pid=3445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:10.273000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:10.292049 kubelet[1565]: I1213 14:32:10.291746 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/02a85e51-d0ed-4120-a8d6-b1b3595d0ba4-data\") pod \"nfs-server-provisioner-0\" (UID: \"02a85e51-d0ed-4120-a8d6-b1b3595d0ba4\") " pod="default/nfs-server-provisioner-0" Dec 13 14:32:10.292049 kubelet[1565]: I1213 14:32:10.291804 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k7p67\" (UniqueName: \"kubernetes.io/projected/02a85e51-d0ed-4120-a8d6-b1b3595d0ba4-kube-api-access-k7p67\") pod \"nfs-server-provisioner-0\" (UID: \"02a85e51-d0ed-4120-a8d6-b1b3595d0ba4\") " pod="default/nfs-server-provisioner-0" Dec 13 14:32:10.456756 env[1231]: time="2024-12-13T14:32:10.456600487Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:02a85e51-d0ed-4120-a8d6-b1b3595d0ba4,Namespace:default,Attempt:0,}" Dec 13 14:32:10.628166 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:32:10.623804 systemd-networkd[1035]: cali60e51b789ff: Link UP Dec 13 14:32:10.636886 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:32:10.637182 systemd-networkd[1035]: cali60e51b789ff: Gained carrier Dec 13 14:32:10.659520 env[1231]: 2024-12-13 14:32:10.527 [INFO][3448] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.60-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 02a85e51-d0ed-4120-a8d6-b1b3595d0ba4 1318 0 2024-12-13 14:32:10 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.128.0.60 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.60-k8s-nfs--server--provisioner--0-" Dec 13 14:32:10.659520 env[1231]: 2024-12-13 14:32:10.527 [INFO][3448] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.60-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:32:10.659520 env[1231]: 2024-12-13 14:32:10.562 [INFO][3458] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7" HandleID="k8s-pod-network.ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7" Workload="10.128.0.60-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:32:10.659520 env[1231]: 2024-12-13 14:32:10.580 [INFO][3458] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7" HandleID="k8s-pod-network.ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7" Workload="10.128.0.60-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000308fe0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.60", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:32:10.562541354 +0000 UTC"}, Hostname:"10.128.0.60", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:32:10.659520 env[1231]: 2024-12-13 14:32:10.580 [INFO][3458] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:10.659520 env[1231]: 2024-12-13 14:32:10.580 [INFO][3458] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:10.659520 env[1231]: 2024-12-13 14:32:10.580 [INFO][3458] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.60' Dec 13 14:32:10.659520 env[1231]: 2024-12-13 14:32:10.583 [INFO][3458] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7" host="10.128.0.60" Dec 13 14:32:10.659520 env[1231]: 2024-12-13 14:32:10.589 [INFO][3458] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.60" Dec 13 14:32:10.659520 env[1231]: 2024-12-13 14:32:10.595 [INFO][3458] ipam/ipam.go 489: Trying affinity for 192.168.64.128/26 host="10.128.0.60" Dec 13 14:32:10.659520 env[1231]: 2024-12-13 14:32:10.597 [INFO][3458] ipam/ipam.go 155: Attempting to load block cidr=192.168.64.128/26 host="10.128.0.60" Dec 13 14:32:10.659520 env[1231]: 2024-12-13 14:32:10.601 [INFO][3458] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.128/26 host="10.128.0.60" Dec 13 14:32:10.659520 env[1231]: 2024-12-13 14:32:10.601 [INFO][3458] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.128/26 handle="k8s-pod-network.ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7" host="10.128.0.60" Dec 13 14:32:10.659520 env[1231]: 2024-12-13 14:32:10.603 [INFO][3458] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7 Dec 13 14:32:10.659520 env[1231]: 2024-12-13 14:32:10.608 [INFO][3458] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.64.128/26 handle="k8s-pod-network.ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7" host="10.128.0.60" Dec 13 14:32:10.659520 env[1231]: 2024-12-13 14:32:10.616 [INFO][3458] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.64.131/26] block=192.168.64.128/26 handle="k8s-pod-network.ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7" host="10.128.0.60" Dec 13 14:32:10.659520 env[1231]: 2024-12-13 14:32:10.616 [INFO][3458] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.131/26] handle="k8s-pod-network.ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7" host="10.128.0.60" Dec 13 14:32:10.659520 env[1231]: 2024-12-13 14:32:10.616 [INFO][3458] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:10.659520 env[1231]: 2024-12-13 14:32:10.616 [INFO][3458] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.64.131/26] IPv6=[] ContainerID="ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7" HandleID="k8s-pod-network.ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7" Workload="10.128.0.60-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:32:10.660831 env[1231]: 2024-12-13 14:32:10.618 [INFO][3448] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.60-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.60-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"02a85e51-d0ed-4120-a8d6-b1b3595d0ba4", ResourceVersion:"1318", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.60", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.64.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:10.660831 env[1231]: 2024-12-13 14:32:10.618 [INFO][3448] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.64.131/32] ContainerID="ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.60-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:32:10.660831 env[1231]: 2024-12-13 14:32:10.619 [INFO][3448] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.60-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:32:10.660831 env[1231]: 2024-12-13 14:32:10.636 [INFO][3448] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.60-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:32:10.661245 env[1231]: 2024-12-13 14:32:10.638 [INFO][3448] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.60-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.60-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"02a85e51-d0ed-4120-a8d6-b1b3595d0ba4", ResourceVersion:"1318", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.60", ContainerID:"ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.64.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"3a:46:40:af:ed:65", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:10.661245 env[1231]: 2024-12-13 14:32:10.649 [INFO][3448] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.60-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:32:10.672000 audit[3479]: NETFILTER_CFG table=filter:87 family=2 entries=38 op=nft_register_chain pid=3479 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:32:10.672000 audit[3479]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fff1ec20990 a2=0 a3=7fff1ec2097c items=0 ppid=3164 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.672000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:32:10.683410 env[1231]: time="2024-12-13T14:32:10.683294529Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:32:10.683410 env[1231]: time="2024-12-13T14:32:10.683429346Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:32:10.683680 env[1231]: time="2024-12-13T14:32:10.683472265Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:32:10.683743 env[1231]: time="2024-12-13T14:32:10.683687536Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7 pid=3487 runtime=io.containerd.runc.v2 Dec 13 14:32:10.712741 systemd[1]: Started cri-containerd-ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7.scope. Dec 13 14:32:10.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.737000 audit: BPF prog-id=164 op=LOAD Dec 13 14:32:10.737000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.737000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3487 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162326562393036663362646366373166396462613930313833376563 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3487 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162326562393036663362646366373166396462613930313833376563 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit: BPF prog-id=165 op=LOAD Dec 13 14:32:10.738000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002214c0 items=0 ppid=3487 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162326562393036663362646366373166396462613930313833376563 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit: BPF prog-id=166 op=LOAD Dec 13 14:32:10.738000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000221508 items=0 ppid=3487 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162326562393036663362646366373166396462613930313833376563 Dec 13 14:32:10.738000 audit: BPF prog-id=166 op=UNLOAD Dec 13 14:32:10.738000 audit: BPF prog-id=165 op=UNLOAD Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { perfmon } for pid=3497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit[3497]: AVC avc: denied { bpf } for pid=3497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:10.738000 audit: BPF prog-id=167 op=LOAD Dec 13 14:32:10.738000 audit[3497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000221918 items=0 ppid=3487 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:10.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162326562393036663362646366373166396462613930313833376563 Dec 13 14:32:10.784691 env[1231]: time="2024-12-13T14:32:10.782010201Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:02a85e51-d0ed-4120-a8d6-b1b3595d0ba4,Namespace:default,Attempt:0,} returns sandbox id \"ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7\"" Dec 13 14:32:10.787539 env[1231]: time="2024-12-13T14:32:10.787494014Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:32:11.223875 kubelet[1565]: E1213 14:32:11.223800 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:11.412327 systemd[1]: run-containerd-runc-k8s.io-ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7-runc.oFL5nz.mount: Deactivated successfully. Dec 13 14:32:12.178017 systemd-networkd[1035]: cali60e51b789ff: Gained IPv6LL Dec 13 14:32:12.224226 kubelet[1565]: E1213 14:32:12.224166 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:13.225172 kubelet[1565]: E1213 14:32:13.225099 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:13.524834 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1803463866.mount: Deactivated successfully. Dec 13 14:32:14.225659 kubelet[1565]: E1213 14:32:14.225559 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:15.225749 kubelet[1565]: E1213 14:32:15.225692 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:16.005836 env[1231]: time="2024-12-13T14:32:16.005760687Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:16.009186 env[1231]: time="2024-12-13T14:32:16.009137256Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:16.011816 env[1231]: time="2024-12-13T14:32:16.011765845Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:16.014361 env[1231]: time="2024-12-13T14:32:16.014315470Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:16.015314 env[1231]: time="2024-12-13T14:32:16.015256276Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 14:32:16.018375 env[1231]: time="2024-12-13T14:32:16.018313964Z" level=info msg="CreateContainer within sandbox \"ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:32:16.041642 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1357722433.mount: Deactivated successfully. Dec 13 14:32:16.047496 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3384210678.mount: Deactivated successfully. Dec 13 14:32:16.048904 env[1231]: time="2024-12-13T14:32:16.048792098Z" level=info msg="CreateContainer within sandbox \"ab2eb906f3bdcf71f9dba901837ecb4f5835faddf10831436b8c383df31317d7\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"12d7565f0b2afb87b03a2b9683793c76c465f1644dd7091dd09291e40de6506d\"" Dec 13 14:32:16.050834 env[1231]: time="2024-12-13T14:32:16.050781000Z" level=info msg="StartContainer for \"12d7565f0b2afb87b03a2b9683793c76c465f1644dd7091dd09291e40de6506d\"" Dec 13 14:32:16.093529 systemd[1]: Started cri-containerd-12d7565f0b2afb87b03a2b9683793c76c465f1644dd7091dd09291e40de6506d.scope. Dec 13 14:32:16.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.122935 kernel: kauditd_printk_skb: 62 callbacks suppressed Dec 13 14:32:16.123100 kernel: audit: type=1400 audit(1734100336.116:941): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.143889 kernel: audit: type=1400 audit(1734100336.116:942): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.185162 kernel: audit: type=1400 audit(1734100336.116:943): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.185361 kernel: audit: type=1400 audit(1734100336.116:944): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.226910 kernel: audit: type=1400 audit(1734100336.116:945): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.227089 kubelet[1565]: E1213 14:32:16.227006 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:16.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.269765 kernel: audit: type=1400 audit(1734100336.116:946): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.269968 kernel: audit: type=1400 audit(1734100336.116:947): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.270092 kernel: audit: type=1400 audit(1734100336.116:948): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.319964 kernel: audit: type=1400 audit(1734100336.116:949): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.340944 kernel: audit: type=1400 audit(1734100336.116:950): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.116000 audit: BPF prog-id=168 op=LOAD Dec 13 14:32:16.120000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.120000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3487 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132643735363566306232616662383762303361326239363833373933 Dec 13 14:32:16.120000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.120000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3487 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132643735363566306232616662383762303361326239363833373933 Dec 13 14:32:16.120000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.120000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.120000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.120000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.120000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.120000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.120000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.120000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.120000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.120000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.120000 audit: BPF prog-id=169 op=LOAD Dec 13 14:32:16.120000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024770 items=0 ppid=3487 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132643735363566306232616662383762303361326239363833373933 Dec 13 14:32:16.164000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.164000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.164000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.164000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.164000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.164000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.164000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.164000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.164000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.164000 audit: BPF prog-id=170 op=LOAD Dec 13 14:32:16.164000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0000247b8 items=0 ppid=3487 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132643735363566306232616662383762303361326239363833373933 Dec 13 14:32:16.205000 audit: BPF prog-id=170 op=UNLOAD Dec 13 14:32:16.205000 audit: BPF prog-id=169 op=UNLOAD Dec 13 14:32:16.205000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.205000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.205000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.205000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.205000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.205000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.205000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.205000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.205000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.205000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:16.205000 audit: BPF prog-id=171 op=LOAD Dec 13 14:32:16.205000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000024bc8 items=0 ppid=3487 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132643735363566306232616662383762303361326239363833373933 Dec 13 14:32:16.345624 env[1231]: time="2024-12-13T14:32:16.345545149Z" level=info msg="StartContainer for \"12d7565f0b2afb87b03a2b9683793c76c465f1644dd7091dd09291e40de6506d\" returns successfully" Dec 13 14:32:16.387000 audit[3569]: AVC avc: denied { search } for pid=3569 comm="rpcbind" name="crypto" dev="proc" ino=25167 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c851 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:32:16.387000 audit[3569]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fc7816360c0 a2=0 a3=0 items=0 ppid=3551 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c851 key=(null) Dec 13 14:32:16.387000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 14:32:16.436000 audit[3574]: AVC avc: denied { search } for pid=3574 comm="dbus-daemon" name="crypto" dev="proc" ino=25167 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c851 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:32:16.436000 audit[3574]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fcf2de3f0c0 a2=0 a3=0 items=0 ppid=3551 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c851 key=(null) Dec 13 14:32:16.436000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:32:16.440000 audit[3575]: AVC avc: denied { watch } for pid=3575 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=20772 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c851 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c637,c851 tclass=dir permissive=0 Dec 13 14:32:16.440000 audit[3575]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55cbdbd28040 a2=2c8 a3=7ffd01b71fcc items=0 ppid=3551 pid=3575 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c851 key=(null) Dec 13 14:32:16.440000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:32:16.445000 audit[3576]: AVC avc: denied { read } for pid=3576 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=25252 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c851 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 14:32:16.445000 audit[3576]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fc5873fe320 a1=80000 a2=d a3=7fff57f1e0e0 items=0 ppid=3551 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c851 key=(null) Dec 13 14:32:16.445000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:32:16.447000 audit[3576]: AVC avc: denied { search } for pid=3576 comm="ganesha.nfsd" name="crypto" dev="proc" ino=25167 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c851 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:32:16.447000 audit[3576]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fc5869520c0 a2=0 a3=0 items=0 ppid=3551 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c851 key=(null) Dec 13 14:32:16.447000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:32:16.656911 kubelet[1565]: I1213 14:32:16.656841 1565 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.4280074200000001 podStartE2EDuration="6.656781394s" podCreationTimestamp="2024-12-13 14:32:10 +0000 UTC" firstStartedPulling="2024-12-13 14:32:10.786891556 +0000 UTC m=+48.422661272" lastFinishedPulling="2024-12-13 14:32:16.015665519 +0000 UTC m=+53.651435246" observedRunningTime="2024-12-13 14:32:16.655868019 +0000 UTC m=+54.291637753" watchObservedRunningTime="2024-12-13 14:32:16.656781394 +0000 UTC m=+54.292551129" Dec 13 14:32:16.673000 audit[3594]: NETFILTER_CFG table=filter:88 family=2 entries=20 op=nft_register_rule pid=3594 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:16.673000 audit[3594]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc8e7648e0 a2=0 a3=7ffc8e7648cc items=0 ppid=1716 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.673000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:16.680000 audit[3594]: NETFILTER_CFG table=nat:89 family=2 entries=106 op=nft_register_chain pid=3594 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:16.680000 audit[3594]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffc8e7648e0 a2=0 a3=7ffc8e7648cc items=0 ppid=1716 pid=3594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:16.680000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:17.031905 systemd[1]: run-containerd-runc-k8s.io-12d7565f0b2afb87b03a2b9683793c76c465f1644dd7091dd09291e40de6506d-runc.zFJ2Q4.mount: Deactivated successfully. Dec 13 14:32:17.227330 kubelet[1565]: E1213 14:32:17.227255 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:18.228008 kubelet[1565]: E1213 14:32:18.227938 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:19.229035 kubelet[1565]: E1213 14:32:19.228963 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:20.229258 kubelet[1565]: E1213 14:32:20.229189 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:21.230226 kubelet[1565]: E1213 14:32:21.230161 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:22.230994 kubelet[1565]: E1213 14:32:22.230931 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:23.172483 kubelet[1565]: E1213 14:32:23.172420 1565 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:23.232034 kubelet[1565]: E1213 14:32:23.231965 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:23.256274 env[1231]: time="2024-12-13T14:32:23.256220785Z" level=info msg="StopPodSandbox for \"8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246\"" Dec 13 14:32:23.257055 env[1231]: time="2024-12-13T14:32:23.256980137Z" level=info msg="TearDown network for sandbox \"8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246\" successfully" Dec 13 14:32:23.257211 env[1231]: time="2024-12-13T14:32:23.257184486Z" level=info msg="StopPodSandbox for \"8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246\" returns successfully" Dec 13 14:32:23.257828 env[1231]: time="2024-12-13T14:32:23.257787028Z" level=info msg="RemovePodSandbox for \"8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246\"" Dec 13 14:32:23.258091 env[1231]: time="2024-12-13T14:32:23.258037224Z" level=info msg="Forcibly stopping sandbox \"8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246\"" Dec 13 14:32:23.258279 env[1231]: time="2024-12-13T14:32:23.258251747Z" level=info msg="TearDown network for sandbox \"8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246\" successfully" Dec 13 14:32:23.263547 env[1231]: time="2024-12-13T14:32:23.263496359Z" level=info msg="RemovePodSandbox \"8d17685e0c481c3cf196500eb1097800899d37345fc8700f07192aeb0ef69246\" returns successfully" Dec 13 14:32:23.264281 env[1231]: time="2024-12-13T14:32:23.264242182Z" level=info msg="StopPodSandbox for \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\"" Dec 13 14:32:23.359325 env[1231]: 2024-12-13 14:32:23.311 [WARNING][3619] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"363c0ec2-9beb-4b91-969b-f550c1641f47", ResourceVersion:"1281", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 31, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.60", ContainerID:"873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff", Pod:"nginx-deployment-6d5f899847-sfg5f", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5251a0dd546", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:23.359325 env[1231]: 2024-12-13 14:32:23.311 [INFO][3619] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Dec 13 14:32:23.359325 env[1231]: 2024-12-13 14:32:23.311 [INFO][3619] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" iface="eth0" netns="" Dec 13 14:32:23.359325 env[1231]: 2024-12-13 14:32:23.312 [INFO][3619] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Dec 13 14:32:23.359325 env[1231]: 2024-12-13 14:32:23.312 [INFO][3619] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Dec 13 14:32:23.359325 env[1231]: 2024-12-13 14:32:23.344 [INFO][3626] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" HandleID="k8s-pod-network.c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Workload="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0" Dec 13 14:32:23.359325 env[1231]: 2024-12-13 14:32:23.344 [INFO][3626] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:23.359325 env[1231]: 2024-12-13 14:32:23.344 [INFO][3626] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:23.359325 env[1231]: 2024-12-13 14:32:23.354 [WARNING][3626] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" HandleID="k8s-pod-network.c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Workload="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0" Dec 13 14:32:23.359325 env[1231]: 2024-12-13 14:32:23.354 [INFO][3626] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" HandleID="k8s-pod-network.c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Workload="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0" Dec 13 14:32:23.359325 env[1231]: 2024-12-13 14:32:23.357 [INFO][3626] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:23.359325 env[1231]: 2024-12-13 14:32:23.358 [INFO][3619] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Dec 13 14:32:23.360334 env[1231]: time="2024-12-13T14:32:23.360290700Z" level=info msg="TearDown network for sandbox \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\" successfully" Dec 13 14:32:23.360457 env[1231]: time="2024-12-13T14:32:23.360431757Z" level=info msg="StopPodSandbox for \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\" returns successfully" Dec 13 14:32:23.361062 env[1231]: time="2024-12-13T14:32:23.361015784Z" level=info msg="RemovePodSandbox for \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\"" Dec 13 14:32:23.361218 env[1231]: time="2024-12-13T14:32:23.361054790Z" level=info msg="Forcibly stopping sandbox \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\"" Dec 13 14:32:23.488963 env[1231]: 2024-12-13 14:32:23.431 [WARNING][3645] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"363c0ec2-9beb-4b91-969b-f550c1641f47", ResourceVersion:"1281", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 31, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.60", ContainerID:"873c59611e523aa965ae673179469268e61f50d9a563471d359846ca33d156ff", Pod:"nginx-deployment-6d5f899847-sfg5f", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5251a0dd546", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:23.488963 env[1231]: 2024-12-13 14:32:23.431 [INFO][3645] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Dec 13 14:32:23.488963 env[1231]: 2024-12-13 14:32:23.431 [INFO][3645] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" iface="eth0" netns="" Dec 13 14:32:23.488963 env[1231]: 2024-12-13 14:32:23.431 [INFO][3645] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Dec 13 14:32:23.488963 env[1231]: 2024-12-13 14:32:23.431 [INFO][3645] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Dec 13 14:32:23.488963 env[1231]: 2024-12-13 14:32:23.475 [INFO][3653] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" HandleID="k8s-pod-network.c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Workload="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0" Dec 13 14:32:23.488963 env[1231]: 2024-12-13 14:32:23.475 [INFO][3653] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:23.488963 env[1231]: 2024-12-13 14:32:23.475 [INFO][3653] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:23.488963 env[1231]: 2024-12-13 14:32:23.483 [WARNING][3653] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" HandleID="k8s-pod-network.c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Workload="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0" Dec 13 14:32:23.488963 env[1231]: 2024-12-13 14:32:23.483 [INFO][3653] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" HandleID="k8s-pod-network.c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Workload="10.128.0.60-k8s-nginx--deployment--6d5f899847--sfg5f-eth0" Dec 13 14:32:23.488963 env[1231]: 2024-12-13 14:32:23.484 [INFO][3653] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:23.488963 env[1231]: 2024-12-13 14:32:23.486 [INFO][3645] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f" Dec 13 14:32:23.488963 env[1231]: time="2024-12-13T14:32:23.487214015Z" level=info msg="TearDown network for sandbox \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\" successfully" Dec 13 14:32:23.492357 env[1231]: time="2024-12-13T14:32:23.492298957Z" level=info msg="RemovePodSandbox \"c31a4f91a344f294f4d9c046f96c8c294be3d5994ae27695c3b31a541dd0bc4f\" returns successfully" Dec 13 14:32:23.493208 env[1231]: time="2024-12-13T14:32:23.493166064Z" level=info msg="StopPodSandbox for \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\"" Dec 13 14:32:23.590640 env[1231]: 2024-12-13 14:32:23.547 [WARNING][3672] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.60-k8s-csi--node--driver--98848-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"649f0843-c817-4e51-b153-33c889fdc3bd", ResourceVersion:"1291", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 31, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.60", ContainerID:"bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a", Pod:"csi-node-driver-98848", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.64.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali39c019744f4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:23.590640 env[1231]: 2024-12-13 14:32:23.547 [INFO][3672] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Dec 13 14:32:23.590640 env[1231]: 2024-12-13 14:32:23.547 [INFO][3672] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" iface="eth0" netns="" Dec 13 14:32:23.590640 env[1231]: 2024-12-13 14:32:23.548 [INFO][3672] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Dec 13 14:32:23.590640 env[1231]: 2024-12-13 14:32:23.548 [INFO][3672] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Dec 13 14:32:23.590640 env[1231]: 2024-12-13 14:32:23.579 [INFO][3678] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" HandleID="k8s-pod-network.f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Workload="10.128.0.60-k8s-csi--node--driver--98848-eth0" Dec 13 14:32:23.590640 env[1231]: 2024-12-13 14:32:23.579 [INFO][3678] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:23.590640 env[1231]: 2024-12-13 14:32:23.579 [INFO][3678] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:23.590640 env[1231]: 2024-12-13 14:32:23.586 [WARNING][3678] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" HandleID="k8s-pod-network.f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Workload="10.128.0.60-k8s-csi--node--driver--98848-eth0" Dec 13 14:32:23.590640 env[1231]: 2024-12-13 14:32:23.586 [INFO][3678] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" HandleID="k8s-pod-network.f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Workload="10.128.0.60-k8s-csi--node--driver--98848-eth0" Dec 13 14:32:23.590640 env[1231]: 2024-12-13 14:32:23.588 [INFO][3678] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:23.590640 env[1231]: 2024-12-13 14:32:23.589 [INFO][3672] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Dec 13 14:32:23.591649 env[1231]: time="2024-12-13T14:32:23.591592300Z" level=info msg="TearDown network for sandbox \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\" successfully" Dec 13 14:32:23.591771 env[1231]: time="2024-12-13T14:32:23.591648346Z" level=info msg="StopPodSandbox for \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\" returns successfully" Dec 13 14:32:23.592402 env[1231]: time="2024-12-13T14:32:23.592349487Z" level=info msg="RemovePodSandbox for \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\"" Dec 13 14:32:23.592522 env[1231]: time="2024-12-13T14:32:23.592397091Z" level=info msg="Forcibly stopping sandbox \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\"" Dec 13 14:32:23.681787 env[1231]: 2024-12-13 14:32:23.639 [WARNING][3696] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.60-k8s-csi--node--driver--98848-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"649f0843-c817-4e51-b153-33c889fdc3bd", ResourceVersion:"1291", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 31, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.60", ContainerID:"bf7f070ce4bc2906469f324450f7d4697c4b0bac332d750c6dc065a6b4832a4a", Pod:"csi-node-driver-98848", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.64.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali39c019744f4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:23.681787 env[1231]: 2024-12-13 14:32:23.639 [INFO][3696] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Dec 13 14:32:23.681787 env[1231]: 2024-12-13 14:32:23.639 [INFO][3696] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" iface="eth0" netns="" Dec 13 14:32:23.681787 env[1231]: 2024-12-13 14:32:23.639 [INFO][3696] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Dec 13 14:32:23.681787 env[1231]: 2024-12-13 14:32:23.639 [INFO][3696] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Dec 13 14:32:23.681787 env[1231]: 2024-12-13 14:32:23.668 [INFO][3703] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" HandleID="k8s-pod-network.f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Workload="10.128.0.60-k8s-csi--node--driver--98848-eth0" Dec 13 14:32:23.681787 env[1231]: 2024-12-13 14:32:23.668 [INFO][3703] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:23.681787 env[1231]: 2024-12-13 14:32:23.668 [INFO][3703] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:23.681787 env[1231]: 2024-12-13 14:32:23.676 [WARNING][3703] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" HandleID="k8s-pod-network.f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Workload="10.128.0.60-k8s-csi--node--driver--98848-eth0" Dec 13 14:32:23.681787 env[1231]: 2024-12-13 14:32:23.676 [INFO][3703] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" HandleID="k8s-pod-network.f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Workload="10.128.0.60-k8s-csi--node--driver--98848-eth0" Dec 13 14:32:23.681787 env[1231]: 2024-12-13 14:32:23.679 [INFO][3703] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:23.681787 env[1231]: 2024-12-13 14:32:23.680 [INFO][3696] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4" Dec 13 14:32:23.682673 env[1231]: time="2024-12-13T14:32:23.681826445Z" level=info msg="TearDown network for sandbox \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\" successfully" Dec 13 14:32:23.686606 env[1231]: time="2024-12-13T14:32:23.686545053Z" level=info msg="RemovePodSandbox \"f176ec9ab4de0c3c1d110072d676c399585d24096bf200593a09562834248db4\" returns successfully" Dec 13 14:32:24.232728 kubelet[1565]: E1213 14:32:24.232659 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:25.233172 kubelet[1565]: E1213 14:32:25.233123 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:26.198836 systemd[1]: run-containerd-runc-k8s.io-231101ad148f3e7b0de7fa5068792e7c9c8eafa2058f205e297eb8567c1a1863-runc.nwW209.mount: Deactivated successfully. Dec 13 14:32:26.234669 kubelet[1565]: E1213 14:32:26.234267 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:26.501154 kubelet[1565]: I1213 14:32:26.500959 1565 topology_manager.go:215] "Topology Admit Handler" podUID="37fb0e9b-4859-4227-a697-61321e453049" podNamespace="default" podName="test-pod-1" Dec 13 14:32:26.508932 systemd[1]: Created slice kubepods-besteffort-pod37fb0e9b_4859_4227_a697_61321e453049.slice. Dec 13 14:32:26.602434 kubelet[1565]: I1213 14:32:26.602381 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-03fcbf31-fe8a-47dd-861f-ddc824290591\" (UniqueName: \"kubernetes.io/nfs/37fb0e9b-4859-4227-a697-61321e453049-pvc-03fcbf31-fe8a-47dd-861f-ddc824290591\") pod \"test-pod-1\" (UID: \"37fb0e9b-4859-4227-a697-61321e453049\") " pod="default/test-pod-1" Dec 13 14:32:26.602758 kubelet[1565]: I1213 14:32:26.602734 1565 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jzx5s\" (UniqueName: \"kubernetes.io/projected/37fb0e9b-4859-4227-a697-61321e453049-kube-api-access-jzx5s\") pod \"test-pod-1\" (UID: \"37fb0e9b-4859-4227-a697-61321e453049\") " pod="default/test-pod-1" Dec 13 14:32:26.738914 kernel: Failed to create system directory netfs Dec 13 14:32:26.739108 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 14:32:26.739158 kernel: audit: type=1400 audit(1734100346.722:966): avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:26.722000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:26.767457 kernel: Failed to create system directory netfs Dec 13 14:32:26.767621 kernel: audit: type=1400 audit(1734100346.722:966): avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:26.722000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:26.800714 kernel: Failed to create system directory netfs Dec 13 14:32:26.800900 kernel: audit: type=1400 audit(1734100346.722:966): avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:26.800943 kernel: Failed to create system directory netfs Dec 13 14:32:26.722000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:26.852090 kernel: audit: type=1400 audit(1734100346.722:966): avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:26.722000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:26.722000 audit[3734]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555b803945e0 a1=153bc a2=555b409792b0 a3=5 items=0 ppid=696 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.722000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:32:26.886097 kernel: audit: type=1300 audit(1734100346.722:966): arch=c000003e syscall=175 success=yes exit=0 a0=555b803945e0 a1=153bc a2=555b409792b0 a3=5 items=0 ppid=696 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.886161 kernel: audit: type=1327 audit(1734100346.722:966): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:32:26.926174 kernel: Failed to create system directory fscache Dec 13 14:32:26.926416 kernel: audit: type=1400 audit(1734100346.892:967): avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:26.926467 kernel: Failed to create system directory fscache Dec 13 14:32:26.892000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:26.954626 kernel: audit: type=1400 audit(1734100346.892:967): avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:26.954776 kernel: Failed to create system directory fscache Dec 13 14:32:26.892000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:26.982908 kernel: audit: type=1400 audit(1734100346.892:967): avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:26.983056 kernel: Failed to create system directory fscache Dec 13 14:32:26.892000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.011736 kernel: audit: type=1400 audit(1734100346.892:967): avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.011939 kernel: Failed to create system directory fscache Dec 13 14:32:26.892000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:26.892000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:26.892000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.022123 kernel: Failed to create system directory fscache Dec 13 14:32:27.022259 kernel: Failed to create system directory fscache Dec 13 14:32:26.892000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:26.892000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.032709 kernel: Failed to create system directory fscache Dec 13 14:32:27.032825 kernel: Failed to create system directory fscache Dec 13 14:32:26.892000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:26.892000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.043200 kernel: Failed to create system directory fscache Dec 13 14:32:27.043355 kernel: Failed to create system directory fscache Dec 13 14:32:26.892000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:26.892000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.053714 kernel: Failed to create system directory fscache Dec 13 14:32:27.053812 kernel: Failed to create system directory fscache Dec 13 14:32:26.892000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:26.892000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.064177 kernel: Failed to create system directory fscache Dec 13 14:32:26.892000 audit[3734]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555b805a99c0 a1=4c0fc a2=555b409792b0 a3=5 items=0 ppid=696 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.892000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:32:27.069971 kernel: FS-Cache: Loaded Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.119637 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.119788 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.119829 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.129887 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.129991 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.140151 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.140385 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.150397 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.150539 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.160687 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.160891 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.165901 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.176095 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.176285 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.186399 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.186493 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.196633 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.196749 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.206869 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.206979 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.217373 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.217564 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.227708 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.227810 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.235307 kubelet[1565]: E1213 14:32:27.235235 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:27.238083 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.238206 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.243302 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.248442 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.253529 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.258670 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.263787 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.269031 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.279298 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.279439 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.289638 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.289742 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.299944 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.300289 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.310191 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.310365 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.320420 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.320621 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.331053 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.331191 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.336282 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.346562 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.346703 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.357030 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.357163 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.367342 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.372646 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.372799 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.377914 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.385104 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.388167 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.398467 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.398617 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.408942 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.409124 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.419288 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.419415 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.429733 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.429872 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.440005 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.440110 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.450359 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.450450 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.455892 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.465829 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.465982 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.471962 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.488380 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.488501 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.488568 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.497244 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.497377 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.507551 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.507630 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.517815 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.517932 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.528094 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.528200 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.538349 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.538483 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.548603 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.548713 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.558868 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.558992 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.564351 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.574362 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.574504 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.584897 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.585029 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.590203 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.600492 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.600607 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.610960 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.611088 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.621217 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.621332 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.626418 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.636662 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.636773 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.641748 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.647004 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.657201 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.657340 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.667400 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.667531 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.674309 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.682922 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.683069 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.693173 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.693316 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.703586 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.703699 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.713784 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.713919 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.724113 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.724197 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.729238 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.739530 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.739629 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.750172 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.750305 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.096000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.760507 kernel: Failed to create system directory sunrpc Dec 13 14:32:27.781059 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:32:27.781200 kernel: RPC: Registered udp transport module. Dec 13 14:32:27.781278 kernel: RPC: Registered tcp transport module. Dec 13 14:32:27.785809 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:32:27.096000 audit[3734]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555b805f5ad0 a1=1a7f1c a2=555b409792b0 a3=5 items=6 ppid=696 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:27.096000 audit: CWD cwd="/" Dec 13 14:32:27.096000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:27.096000 audit: PATH item=1 name=(null) inode=25500 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:27.096000 audit: PATH item=2 name=(null) inode=25500 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:27.096000 audit: PATH item=3 name=(null) inode=25501 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:27.096000 audit: PATH item=4 name=(null) inode=25500 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:27.096000 audit: PATH item=5 name=(null) inode=25502 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:32:27.096000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.854095 kernel: Failed to create system directory nfs Dec 13 14:32:27.854229 kernel: Failed to create system directory nfs Dec 13 14:32:27.854274 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.868752 kernel: Failed to create system directory nfs Dec 13 14:32:27.868905 kernel: Failed to create system directory nfs Dec 13 14:32:27.868942 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.878524 kernel: Failed to create system directory nfs Dec 13 14:32:27.878631 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.883414 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.888512 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.893368 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.898240 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.903088 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.908012 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.917886 kernel: Failed to create system directory nfs Dec 13 14:32:27.918032 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.927659 kernel: Failed to create system directory nfs Dec 13 14:32:27.927796 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.937435 kernel: Failed to create system directory nfs Dec 13 14:32:27.937544 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.947162 kernel: Failed to create system directory nfs Dec 13 14:32:27.947251 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.956984 kernel: Failed to create system directory nfs Dec 13 14:32:27.957083 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.966624 kernel: Failed to create system directory nfs Dec 13 14:32:27.966713 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.971436 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.976422 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.986147 kernel: Failed to create system directory nfs Dec 13 14:32:27.986242 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.995885 kernel: Failed to create system directory nfs Dec 13 14:32:27.995996 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.005576 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.005918 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.010946 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.020604 kernel: Failed to create system directory nfs Dec 13 14:32:28.020701 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.030356 kernel: Failed to create system directory nfs Dec 13 14:32:28.030457 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.040090 kernel: Failed to create system directory nfs Dec 13 14:32:28.040283 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.049936 kernel: Failed to create system directory nfs Dec 13 14:32:28.050068 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.059697 kernel: Failed to create system directory nfs Dec 13 14:32:28.059791 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.069334 kernel: Failed to create system directory nfs Dec 13 14:32:28.069507 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.079141 kernel: Failed to create system directory nfs Dec 13 14:32:28.079276 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.084007 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.093723 kernel: Failed to create system directory nfs Dec 13 14:32:28.093919 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.103796 kernel: Failed to create system directory nfs Dec 13 14:32:28.103951 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.113707 kernel: Failed to create system directory nfs Dec 13 14:32:28.113885 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.123575 kernel: Failed to create system directory nfs Dec 13 14:32:28.123773 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.133504 kernel: Failed to create system directory nfs Dec 13 14:32:28.133641 kernel: Failed to create system directory nfs Dec 13 14:32:27.833000 audit[3734]: AVC avc: denied { confidentiality } for pid=3734 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.166963 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:32:27.833000 audit[3734]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555b80816700 a1=16e97c a2=555b409792b0 a3=5 items=0 ppid=696 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:27.833000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.228272 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.228426 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.228467 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.235479 kubelet[1565]: E1213 14:32:28.235402 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:28.238588 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.238760 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.248361 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.248532 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.258442 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.258584 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.268619 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.268749 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.273368 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.278392 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.283330 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.288387 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.293281 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.298390 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.303349 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.308355 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.313355 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.318269 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.323262 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.328226 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.333203 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.338130 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.343314 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.353309 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.353447 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.358659 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.368786 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.368952 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.378537 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.378710 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.388535 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.388682 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.398536 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.398710 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.408504 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.408628 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.418410 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.418559 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.428316 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.428402 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.438253 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.438373 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.448172 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.448253 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.458093 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.458217 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.468111 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.468220 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.478039 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.478126 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.483039 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.492987 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.493160 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.503066 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.503257 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.508031 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.517969 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.518082 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.527841 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.527956 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.537795 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.537946 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.547751 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.547915 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.557752 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.557987 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.562803 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.572675 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.572803 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.577894 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.587584 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.592764 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.592881 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.602783 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.602960 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.612764 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.623130 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.623276 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.623316 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.633101 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.633251 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.643383 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.643539 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.653309 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.653415 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.663213 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.663330 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.673138 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.673306 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.683078 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.683192 kernel: Failed to create system directory nfs4 Dec 13 14:32:28.204000 audit[3740]: AVC avc: denied { confidentiality } for pid=3740 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.863759 kernel: NFS: Registering the id_resolver key type Dec 13 14:32:28.863938 kernel: Key type id_resolver registered Dec 13 14:32:28.864008 kernel: Key type id_legacy registered Dec 13 14:32:28.204000 audit[3740]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fc1d4f5b010 a1=208de4 a2=5610325db2b0 a3=5 items=0 ppid=696 pid=3740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:28.204000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.895057 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.895174 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.895217 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.905312 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.905405 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.915565 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.915715 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.925808 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.925912 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.936057 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.936153 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.946334 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.946441 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.956604 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.956756 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.966924 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.967047 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.977195 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.977359 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.987452 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.987548 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.997716 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.997806 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:29.013136 kernel: Failed to create system directory rpcgss Dec 13 14:32:29.013299 kernel: Failed to create system directory rpcgss Dec 13 14:32:29.013337 kernel: Failed to create system directory rpcgss Dec 13 14:32:28.880000 audit[3743]: AVC avc: denied { confidentiality } for pid=3743 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:32:28.880000 audit[3743]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fd5c85a0010 a1=70af4 a2=55a4fd1d62b0 a3=5 items=0 ppid=696 pid=3743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:28.880000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:32:29.056467 nfsidmap[3752]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Dec 13 14:32:29.077056 nfsidmap[3753]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Dec 13 14:32:29.092000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2914 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:32:29.092000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2914 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:32:29.092000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2914 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:32:29.093000 audit[1376]: AVC avc: denied { watch_reads } for pid=1376 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2914 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:32:29.093000 audit[1376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55b468dd20e0 a2=10 a3=e73eefc18704e7ed items=0 ppid=1 pid=1376 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:29.093000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:32:29.094000 audit[1376]: AVC avc: denied { watch_reads } for pid=1376 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2914 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:32:29.094000 audit[1376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55b468dd20e0 a2=10 a3=e73eefc18704e7ed items=0 ppid=1 pid=1376 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:29.094000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:32:29.094000 audit[1376]: AVC avc: denied { watch_reads } for pid=1376 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2914 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:32:29.094000 audit[1376]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55b468dd20e0 a2=10 a3=e73eefc18704e7ed items=0 ppid=1 pid=1376 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:29.094000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:32:29.214559 env[1231]: time="2024-12-13T14:32:29.214396712Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:37fb0e9b-4859-4227-a697-61321e453049,Namespace:default,Attempt:0,}" Dec 13 14:32:29.239165 kubelet[1565]: E1213 14:32:29.239058 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:29.364503 systemd-networkd[1035]: cali5ec59c6bf6e: Link UP Dec 13 14:32:29.378610 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:32:29.378770 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:32:29.383310 systemd-networkd[1035]: cali5ec59c6bf6e: Gained carrier Dec 13 14:32:29.394457 env[1231]: 2024-12-13 14:32:29.277 [INFO][3757] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.60-k8s-test--pod--1-eth0 default 37fb0e9b-4859-4227-a697-61321e453049 1386 0 2024-12-13 14:32:10 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.60 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.60-k8s-test--pod--1-" Dec 13 14:32:29.394457 env[1231]: 2024-12-13 14:32:29.277 [INFO][3757] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.60-k8s-test--pod--1-eth0" Dec 13 14:32:29.394457 env[1231]: 2024-12-13 14:32:29.308 [INFO][3768] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721" HandleID="k8s-pod-network.95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721" Workload="10.128.0.60-k8s-test--pod--1-eth0" Dec 13 14:32:29.394457 env[1231]: 2024-12-13 14:32:29.321 [INFO][3768] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721" HandleID="k8s-pod-network.95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721" Workload="10.128.0.60-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318fd0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.60", "pod":"test-pod-1", "timestamp":"2024-12-13 14:32:29.308956368 +0000 UTC"}, Hostname:"10.128.0.60", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:32:29.394457 env[1231]: 2024-12-13 14:32:29.321 [INFO][3768] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:32:29.394457 env[1231]: 2024-12-13 14:32:29.321 [INFO][3768] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:32:29.394457 env[1231]: 2024-12-13 14:32:29.321 [INFO][3768] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.60' Dec 13 14:32:29.394457 env[1231]: 2024-12-13 14:32:29.323 [INFO][3768] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721" host="10.128.0.60" Dec 13 14:32:29.394457 env[1231]: 2024-12-13 14:32:29.329 [INFO][3768] ipam/ipam.go 372: Looking up existing affinities for host host="10.128.0.60" Dec 13 14:32:29.394457 env[1231]: 2024-12-13 14:32:29.336 [INFO][3768] ipam/ipam.go 489: Trying affinity for 192.168.64.128/26 host="10.128.0.60" Dec 13 14:32:29.394457 env[1231]: 2024-12-13 14:32:29.339 [INFO][3768] ipam/ipam.go 155: Attempting to load block cidr=192.168.64.128/26 host="10.128.0.60" Dec 13 14:32:29.394457 env[1231]: 2024-12-13 14:32:29.342 [INFO][3768] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.64.128/26 host="10.128.0.60" Dec 13 14:32:29.394457 env[1231]: 2024-12-13 14:32:29.342 [INFO][3768] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.64.128/26 handle="k8s-pod-network.95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721" host="10.128.0.60" Dec 13 14:32:29.394457 env[1231]: 2024-12-13 14:32:29.344 [INFO][3768] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721 Dec 13 14:32:29.394457 env[1231]: 2024-12-13 14:32:29.350 [INFO][3768] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.64.128/26 handle="k8s-pod-network.95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721" host="10.128.0.60" Dec 13 14:32:29.394457 env[1231]: 2024-12-13 14:32:29.358 [INFO][3768] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.64.132/26] block=192.168.64.128/26 handle="k8s-pod-network.95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721" host="10.128.0.60" Dec 13 14:32:29.394457 env[1231]: 2024-12-13 14:32:29.358 [INFO][3768] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.64.132/26] handle="k8s-pod-network.95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721" host="10.128.0.60" Dec 13 14:32:29.394457 env[1231]: 2024-12-13 14:32:29.358 [INFO][3768] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:32:29.394457 env[1231]: 2024-12-13 14:32:29.358 [INFO][3768] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.64.132/26] IPv6=[] ContainerID="95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721" HandleID="k8s-pod-network.95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721" Workload="10.128.0.60-k8s-test--pod--1-eth0" Dec 13 14:32:29.395970 env[1231]: 2024-12-13 14:32:29.360 [INFO][3757] cni-plugin/k8s.go 386: Populated endpoint ContainerID="95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.60-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.60-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"37fb0e9b-4859-4227-a697-61321e453049", ResourceVersion:"1386", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.60", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:29.395970 env[1231]: 2024-12-13 14:32:29.360 [INFO][3757] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.64.132/32] ContainerID="95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.60-k8s-test--pod--1-eth0" Dec 13 14:32:29.395970 env[1231]: 2024-12-13 14:32:29.360 [INFO][3757] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.60-k8s-test--pod--1-eth0" Dec 13 14:32:29.395970 env[1231]: 2024-12-13 14:32:29.379 [INFO][3757] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.60-k8s-test--pod--1-eth0" Dec 13 14:32:29.395970 env[1231]: 2024-12-13 14:32:29.379 [INFO][3757] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.60-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.60-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"37fb0e9b-4859-4227-a697-61321e453049", ResourceVersion:"1386", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.60", ContainerID:"95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.64.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"d6:88:34:0c:94:e1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:32:29.395970 env[1231]: 2024-12-13 14:32:29.388 [INFO][3757] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.60-k8s-test--pod--1-eth0" Dec 13 14:32:29.414000 audit[3793]: NETFILTER_CFG table=filter:90 family=2 entries=44 op=nft_register_chain pid=3793 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:32:29.414000 audit[3793]: SYSCALL arch=c000003e syscall=46 success=yes exit=22252 a0=3 a1=7ffe032748c0 a2=0 a3=7ffe032748ac items=0 ppid=3164 pid=3793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:29.414000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:32:29.416644 env[1231]: time="2024-12-13T14:32:29.416071673Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:32:29.416644 env[1231]: time="2024-12-13T14:32:29.416175657Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:32:29.416644 env[1231]: time="2024-12-13T14:32:29.416216323Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:32:29.416644 env[1231]: time="2024-12-13T14:32:29.416573455Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721 pid=3796 runtime=io.containerd.runc.v2 Dec 13 14:32:29.444374 systemd[1]: Started cri-containerd-95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721.scope. Dec 13 14:32:29.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.471000 audit: BPF prog-id=172 op=LOAD Dec 13 14:32:29.471000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.471000 audit[3808]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3796 pid=3808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:29.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935616462303133633639343539656564363834653932336135333465 Dec 13 14:32:29.471000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.471000 audit[3808]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3796 pid=3808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:29.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935616462303133633639343539656564363834653932336135333465 Dec 13 14:32:29.471000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.471000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.471000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.471000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.471000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.471000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.471000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.471000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.471000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.471000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.471000 audit: BPF prog-id=173 op=LOAD Dec 13 14:32:29.471000 audit[3808]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00028a420 items=0 ppid=3796 pid=3808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:29.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935616462303133633639343539656564363834653932336135333465 Dec 13 14:32:29.472000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.472000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.472000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.472000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.472000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.472000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.472000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.472000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.472000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.472000 audit: BPF prog-id=174 op=LOAD Dec 13 14:32:29.472000 audit[3808]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00028a468 items=0 ppid=3796 pid=3808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:29.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935616462303133633639343539656564363834653932336135333465 Dec 13 14:32:29.472000 audit: BPF prog-id=174 op=UNLOAD Dec 13 14:32:29.472000 audit: BPF prog-id=173 op=UNLOAD Dec 13 14:32:29.472000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.472000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.472000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.472000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.472000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.472000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.472000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.472000 audit[3808]: AVC avc: denied { perfmon } for pid=3808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.472000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.472000 audit[3808]: AVC avc: denied { bpf } for pid=3808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.472000 audit: BPF prog-id=175 op=LOAD Dec 13 14:32:29.472000 audit[3808]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00028a878 items=0 ppid=3796 pid=3808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:29.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935616462303133633639343539656564363834653932336135333465 Dec 13 14:32:29.515090 env[1231]: time="2024-12-13T14:32:29.515028910Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:37fb0e9b-4859-4227-a697-61321e453049,Namespace:default,Attempt:0,} returns sandbox id \"95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721\"" Dec 13 14:32:29.518490 env[1231]: time="2024-12-13T14:32:29.518431593Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:32:29.727387 env[1231]: time="2024-12-13T14:32:29.725187590Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:29.729821 env[1231]: time="2024-12-13T14:32:29.729761366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:29.732673 env[1231]: time="2024-12-13T14:32:29.732625988Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:29.735084 env[1231]: time="2024-12-13T14:32:29.735034220Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:29.735965 env[1231]: time="2024-12-13T14:32:29.735910776Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:32:29.739452 env[1231]: time="2024-12-13T14:32:29.739393905Z" level=info msg="CreateContainer within sandbox \"95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:32:29.758255 env[1231]: time="2024-12-13T14:32:29.758182535Z" level=info msg="CreateContainer within sandbox \"95adb013c69459eed684e923a534e1e1725165243a2832a5589c9943f5569721\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"691ec1877510487557b5e310fbb6c3d6618d38f1d4b66428ce294efa9fb31335\"" Dec 13 14:32:29.759430 env[1231]: time="2024-12-13T14:32:29.759372018Z" level=info msg="StartContainer for \"691ec1877510487557b5e310fbb6c3d6618d38f1d4b66428ce294efa9fb31335\"" Dec 13 14:32:29.784349 systemd[1]: Started cri-containerd-691ec1877510487557b5e310fbb6c3d6618d38f1d4b66428ce294efa9fb31335.scope. Dec 13 14:32:29.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.805000 audit: BPF prog-id=176 op=LOAD Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3796 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:29.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639316563313837373531303438373535376235653331306662623663 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3796 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:29.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639316563313837373531303438373535376235653331306662623663 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit: BPF prog-id=177 op=LOAD Dec 13 14:32:29.806000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003bcf20 items=0 ppid=3796 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:29.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639316563313837373531303438373535376235653331306662623663 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.806000 audit: BPF prog-id=178 op=LOAD Dec 13 14:32:29.806000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003bcf68 items=0 ppid=3796 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:29.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639316563313837373531303438373535376235653331306662623663 Dec 13 14:32:29.806000 audit: BPF prog-id=178 op=UNLOAD Dec 13 14:32:29.807000 audit: BPF prog-id=177 op=UNLOAD Dec 13 14:32:29.807000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.807000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.807000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.807000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.807000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.807000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.807000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.807000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.807000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.807000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:29.807000 audit: BPF prog-id=179 op=LOAD Dec 13 14:32:29.807000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003bd378 items=0 ppid=3796 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:29.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639316563313837373531303438373535376235653331306662623663 Dec 13 14:32:29.829350 env[1231]: time="2024-12-13T14:32:29.829287145Z" level=info msg="StartContainer for \"691ec1877510487557b5e310fbb6c3d6618d38f1d4b66428ce294efa9fb31335\" returns successfully" Dec 13 14:32:30.239394 kubelet[1565]: E1213 14:32:30.239320 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:31.240571 kubelet[1565]: E1213 14:32:31.240508 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:31.377589 systemd-networkd[1035]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:32:32.240823 kubelet[1565]: E1213 14:32:32.240756 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:33.241870 kubelet[1565]: E1213 14:32:33.241790 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:34.242101 kubelet[1565]: E1213 14:32:34.242031 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:35.243077 kubelet[1565]: E1213 14:32:35.243009 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:36.243962 kubelet[1565]: E1213 14:32:36.243884 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:32:37.244505 kubelet[1565]: E1213 14:32:37.244431 1565 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"