Dec 13 02:03:18.852304 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024
Dec 13 02:03:18.852333 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c
Dec 13 02:03:18.852341 kernel: BIOS-provided physical RAM map:
Dec 13 02:03:18.852347 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable
Dec 13 02:03:18.852352 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved
Dec 13 02:03:18.852357 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved
Dec 13 02:03:18.852364 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable
Dec 13 02:03:18.852369 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved
Dec 13 02:03:18.852376 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved
Dec 13 02:03:18.852381 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved
Dec 13 02:03:18.852387 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved
Dec 13 02:03:18.852392 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved
Dec 13 02:03:18.852397 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved
Dec 13 02:03:18.852403 kernel: NX (Execute Disable) protection: active
Dec 13 02:03:18.852411 kernel: SMBIOS 2.8 present.
Dec 13 02:03:18.852417 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Dec 13 02:03:18.852423 kernel: Hypervisor detected: KVM
Dec 13 02:03:18.852429 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00
Dec 13 02:03:18.852435 kernel: kvm-clock: cpu 0, msr 3619b001, primary cpu clock
Dec 13 02:03:18.852441 kernel: kvm-clock: using sched offset of 2403258096 cycles
Dec 13 02:03:18.852447 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns
Dec 13 02:03:18.852453 kernel: tsc: Detected 2794.748 MHz processor
Dec 13 02:03:18.852459 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
Dec 13 02:03:18.852467 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable
Dec 13 02:03:18.852473 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000
Dec 13 02:03:18.852479 kernel: x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
Dec 13 02:03:18.852485 kernel: Using GB pages for direct mapping
Dec 13 02:03:18.852491 kernel: ACPI: Early table checksum verification disabled
Dec 13 02:03:18.852497 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS )
Dec 13 02:03:18.852503 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS  BXPC     00000001 BXPC 00000001)
Dec 13 02:03:18.852509 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS  BXPC     00000001 BXPC 00000001)
Dec 13 02:03:18.852515 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS  BXPC     00000001 BXPC 00000001)
Dec 13 02:03:18.852522 kernel: ACPI: FACS 0x000000009CFE0000 000040
Dec 13 02:03:18.852528 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS  BXPC     00000001 BXPC 00000001)
Dec 13 02:03:18.852534 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS  BXPC     00000001 BXPC 00000001)
Dec 13 02:03:18.852540 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS  BXPC     00000001 BXPC 00000001)
Dec 13 02:03:18.852546 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS  BXPC     00000001 BXPC 00000001)
Dec 13 02:03:18.852552 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db]
Dec 13 02:03:18.852558 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7]
Dec 13 02:03:18.852564 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f]
Dec 13 02:03:18.852574 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b]
Dec 13 02:03:18.852581 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3]
Dec 13 02:03:18.852587 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df]
Dec 13 02:03:18.852594 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407]
Dec 13 02:03:18.852600 kernel: No NUMA configuration found
Dec 13 02:03:18.852606 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff]
Dec 13 02:03:18.852614 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff]
Dec 13 02:03:18.852620 kernel: Zone ranges:
Dec 13 02:03:18.852627 kernel:   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
Dec 13 02:03:18.852633 kernel:   DMA32    [mem 0x0000000001000000-0x000000009cfdbfff]
Dec 13 02:03:18.852639 kernel:   Normal   empty
Dec 13 02:03:18.852646 kernel: Movable zone start for each node
Dec 13 02:03:18.852652 kernel: Early memory node ranges
Dec 13 02:03:18.852658 kernel:   node   0: [mem 0x0000000000001000-0x000000000009efff]
Dec 13 02:03:18.852665 kernel:   node   0: [mem 0x0000000000100000-0x000000009cfdbfff]
Dec 13 02:03:18.852672 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff]
Dec 13 02:03:18.852679 kernel: On node 0, zone DMA: 1 pages in unavailable ranges
Dec 13 02:03:18.852685 kernel: On node 0, zone DMA: 97 pages in unavailable ranges
Dec 13 02:03:18.852692 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges
Dec 13 02:03:18.852698 kernel: ACPI: PM-Timer IO Port: 0x608
Dec 13 02:03:18.852704 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1])
Dec 13 02:03:18.852711 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23
Dec 13 02:03:18.852717 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
Dec 13 02:03:18.852723 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level)
Dec 13 02:03:18.852730 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
Dec 13 02:03:18.852738 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level)
Dec 13 02:03:18.852744 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level)
Dec 13 02:03:18.852750 kernel: ACPI: Using ACPI (MADT) for SMP configuration information
Dec 13 02:03:18.852757 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000
Dec 13 02:03:18.852763 kernel: TSC deadline timer available
Dec 13 02:03:18.852769 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs
Dec 13 02:03:18.852776 kernel: kvm-guest: KVM setup pv remote TLB flush
Dec 13 02:03:18.852782 kernel: kvm-guest: setup PV sched yield
Dec 13 02:03:18.852789 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices
Dec 13 02:03:18.852797 kernel: Booting paravirtualized kernel on KVM
Dec 13 02:03:18.852803 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Dec 13 02:03:18.852810 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1
Dec 13 02:03:18.852816 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288
Dec 13 02:03:18.852822 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152
Dec 13 02:03:18.852829 kernel: pcpu-alloc: [0] 0 1 2 3 
Dec 13 02:03:18.852835 kernel: kvm-guest: setup async PF for cpu 0
Dec 13 02:03:18.852841 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0
Dec 13 02:03:18.852848 kernel: kvm-guest: PV spinlocks enabled
Dec 13 02:03:18.852856 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear)
Dec 13 02:03:18.852862 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 632732
Dec 13 02:03:18.852869 kernel: Policy zone: DMA32
Dec 13 02:03:18.852876 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c
Dec 13 02:03:18.852883 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space.
Dec 13 02:03:18.852889 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear)
Dec 13 02:03:18.852896 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Dec 13 02:03:18.852902 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off
Dec 13 02:03:18.852922 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 134796K reserved, 0K cma-reserved)
Dec 13 02:03:18.852928 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1
Dec 13 02:03:18.852935 kernel: ftrace: allocating 34549 entries in 135 pages
Dec 13 02:03:18.852941 kernel: ftrace: allocated 135 pages with 4 groups
Dec 13 02:03:18.852947 kernel: rcu: Hierarchical RCU implementation.
Dec 13 02:03:18.852954 kernel: rcu:         RCU event tracing is enabled.
Dec 13 02:03:18.852961 kernel: rcu:         RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4.
Dec 13 02:03:18.852967 kernel:         Rude variant of Tasks RCU enabled.
Dec 13 02:03:18.852974 kernel:         Tracing variant of Tasks RCU enabled.
Dec 13 02:03:18.852982 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Dec 13 02:03:18.852988 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4
Dec 13 02:03:18.852994 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16
Dec 13 02:03:18.853001 kernel: random: crng init done
Dec 13 02:03:18.853007 kernel: Console: colour VGA+ 80x25
Dec 13 02:03:18.853013 kernel: printk: console [ttyS0] enabled
Dec 13 02:03:18.853020 kernel: ACPI: Core revision 20210730
Dec 13 02:03:18.853026 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns
Dec 13 02:03:18.853033 kernel: APIC: Switch to symmetric I/O mode setup
Dec 13 02:03:18.853041 kernel: x2apic enabled
Dec 13 02:03:18.853047 kernel: Switched APIC routing to physical x2apic.
Dec 13 02:03:18.853054 kernel: kvm-guest: setup PV IPIs
Dec 13 02:03:18.853060 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1
Dec 13 02:03:18.853066 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized
Dec 13 02:03:18.853073 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748)
Dec 13 02:03:18.853080 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated
Dec 13 02:03:18.853086 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127
Dec 13 02:03:18.853093 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0
Dec 13 02:03:18.853105 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Dec 13 02:03:18.853112 kernel: Spectre V2 : Mitigation: Retpolines
Dec 13 02:03:18.853119 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
Dec 13 02:03:18.853127 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT
Dec 13 02:03:18.853134 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls
Dec 13 02:03:18.853140 kernel: RETBleed: Mitigation: untrained return thunk
Dec 13 02:03:18.853147 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier
Dec 13 02:03:18.853154 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp
Dec 13 02:03:18.853161 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Dec 13 02:03:18.853169 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Dec 13 02:03:18.853176 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Dec 13 02:03:18.853182 kernel: x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
Dec 13 02:03:18.853189 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format.
Dec 13 02:03:18.853196 kernel: Freeing SMP alternatives memory: 32K
Dec 13 02:03:18.853203 kernel: pid_max: default: 32768 minimum: 301
Dec 13 02:03:18.853209 kernel: LSM: Security Framework initializing
Dec 13 02:03:18.853216 kernel: SELinux:  Initializing.
Dec 13 02:03:18.853224 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
Dec 13 02:03:18.853230 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
Dec 13 02:03:18.853237 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0)
Dec 13 02:03:18.853244 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver.
Dec 13 02:03:18.853251 kernel: ... version:                0
Dec 13 02:03:18.853257 kernel: ... bit width:              48
Dec 13 02:03:18.853264 kernel: ... generic registers:      6
Dec 13 02:03:18.853271 kernel: ... value mask:             0000ffffffffffff
Dec 13 02:03:18.853277 kernel: ... max period:             00007fffffffffff
Dec 13 02:03:18.853285 kernel: ... fixed-purpose events:   0
Dec 13 02:03:18.853292 kernel: ... event mask:             000000000000003f
Dec 13 02:03:18.853299 kernel: signal: max sigframe size: 1776
Dec 13 02:03:18.853305 kernel: rcu: Hierarchical SRCU implementation.
Dec 13 02:03:18.853312 kernel: smp: Bringing up secondary CPUs ...
Dec 13 02:03:18.853319 kernel: x86: Booting SMP configuration:
Dec 13 02:03:18.853331 kernel: .... node  #0, CPUs:      #1
Dec 13 02:03:18.853338 kernel: kvm-clock: cpu 1, msr 3619b041, secondary cpu clock
Dec 13 02:03:18.853345 kernel: kvm-guest: setup async PF for cpu 1
Dec 13 02:03:18.853352 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0
Dec 13 02:03:18.853359 kernel:  #2
Dec 13 02:03:18.853366 kernel: kvm-clock: cpu 2, msr 3619b081, secondary cpu clock
Dec 13 02:03:18.853372 kernel: kvm-guest: setup async PF for cpu 2
Dec 13 02:03:18.853379 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0
Dec 13 02:03:18.853386 kernel:  #3
Dec 13 02:03:18.853392 kernel: kvm-clock: cpu 3, msr 3619b0c1, secondary cpu clock
Dec 13 02:03:18.853399 kernel: kvm-guest: setup async PF for cpu 3
Dec 13 02:03:18.853405 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0
Dec 13 02:03:18.853413 kernel: smp: Brought up 1 node, 4 CPUs
Dec 13 02:03:18.853420 kernel: smpboot: Max logical packages: 1
Dec 13 02:03:18.853427 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS)
Dec 13 02:03:18.853433 kernel: devtmpfs: initialized
Dec 13 02:03:18.853440 kernel: x86/mm: Memory block size: 128MB
Dec 13 02:03:18.853447 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Dec 13 02:03:18.853454 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear)
Dec 13 02:03:18.853460 kernel: pinctrl core: initialized pinctrl subsystem
Dec 13 02:03:18.853467 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Dec 13 02:03:18.853475 kernel: audit: initializing netlink subsys (disabled)
Dec 13 02:03:18.853481 kernel: audit: type=2000 audit(1734055399.480:1): state=initialized audit_enabled=0 res=1
Dec 13 02:03:18.853488 kernel: thermal_sys: Registered thermal governor 'step_wise'
Dec 13 02:03:18.853495 kernel: thermal_sys: Registered thermal governor 'user_space'
Dec 13 02:03:18.853501 kernel: cpuidle: using governor menu
Dec 13 02:03:18.853508 kernel: ACPI: bus type PCI registered
Dec 13 02:03:18.853515 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Dec 13 02:03:18.853522 kernel: dca service started, version 1.12.1
Dec 13 02:03:18.853528 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000)
Dec 13 02:03:18.853536 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820
Dec 13 02:03:18.853543 kernel: PCI: Using configuration type 1 for base access
Dec 13 02:03:18.853550 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
Dec 13 02:03:18.853557 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
Dec 13 02:03:18.853564 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
Dec 13 02:03:18.853570 kernel: ACPI: Added _OSI(Module Device)
Dec 13 02:03:18.853577 kernel: ACPI: Added _OSI(Processor Device)
Dec 13 02:03:18.853584 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Dec 13 02:03:18.853591 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Dec 13 02:03:18.853598 kernel: ACPI: Added _OSI(Linux-Dell-Video)
Dec 13 02:03:18.853605 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
Dec 13 02:03:18.853612 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
Dec 13 02:03:18.853618 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded
Dec 13 02:03:18.853625 kernel: ACPI: Interpreter enabled
Dec 13 02:03:18.853632 kernel: ACPI: PM: (supports S0 S3 S5)
Dec 13 02:03:18.853639 kernel: ACPI: Using IOAPIC for interrupt routing
Dec 13 02:03:18.853645 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Dec 13 02:03:18.853652 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F
Dec 13 02:03:18.853659 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
Dec 13 02:03:18.853771 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3]
Dec 13 02:03:18.853846 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR]
Dec 13 02:03:18.853929 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability]
Dec 13 02:03:18.853938 kernel: PCI host bridge to bus 0000:00
Dec 13 02:03:18.854019 kernel: pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
Dec 13 02:03:18.854081 kernel: pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
Dec 13 02:03:18.854145 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
Dec 13 02:03:18.854204 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window]
Dec 13 02:03:18.854264 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window]
Dec 13 02:03:18.854332 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window]
Dec 13 02:03:18.854394 kernel: pci_bus 0000:00: root bus resource [bus 00-ff]
Dec 13 02:03:18.854473 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000
Dec 13 02:03:18.854549 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000
Dec 13 02:03:18.854625 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref]
Dec 13 02:03:18.854695 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff]
Dec 13 02:03:18.854763 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref]
Dec 13 02:03:18.854832 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
Dec 13 02:03:18.854924 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00
Dec 13 02:03:18.854995 kernel: pci 0000:00:02.0: reg 0x10: [io  0xc0c0-0xc0df]
Dec 13 02:03:18.855069 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff]
Dec 13 02:03:18.855140 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref]
Dec 13 02:03:18.855216 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000
Dec 13 02:03:18.855284 kernel: pci 0000:00:03.0: reg 0x10: [io  0xc000-0xc07f]
Dec 13 02:03:18.855360 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff]
Dec 13 02:03:18.855427 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref]
Dec 13 02:03:18.855506 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000
Dec 13 02:03:18.855580 kernel: pci 0000:00:04.0: reg 0x10: [io  0xc0e0-0xc0ff]
Dec 13 02:03:18.855647 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff]
Dec 13 02:03:18.855713 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref]
Dec 13 02:03:18.855781 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref]
Dec 13 02:03:18.855853 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100
Dec 13 02:03:18.855933 kernel: pci 0000:00:1f.0: quirk: [io  0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO
Dec 13 02:03:18.856008 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601
Dec 13 02:03:18.856077 kernel: pci 0000:00:1f.2: reg 0x20: [io  0xc100-0xc11f]
Dec 13 02:03:18.856144 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff]
Dec 13 02:03:18.856219 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500
Dec 13 02:03:18.856287 kernel: pci 0000:00:1f.3: reg 0x20: [io  0x0700-0x073f]
Dec 13 02:03:18.856296 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10
Dec 13 02:03:18.856303 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10
Dec 13 02:03:18.856310 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11
Dec 13 02:03:18.856319 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11
Dec 13 02:03:18.856333 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10
Dec 13 02:03:18.856340 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10
Dec 13 02:03:18.856347 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11
Dec 13 02:03:18.856354 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11
Dec 13 02:03:18.856360 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16
Dec 13 02:03:18.856367 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17
Dec 13 02:03:18.856374 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18
Dec 13 02:03:18.856381 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19
Dec 13 02:03:18.856389 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20
Dec 13 02:03:18.856396 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21
Dec 13 02:03:18.856402 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22
Dec 13 02:03:18.856409 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23
Dec 13 02:03:18.856416 kernel: iommu: Default domain type: Translated 
Dec 13 02:03:18.856423 kernel: iommu: DMA domain TLB invalidation policy: lazy mode 
Dec 13 02:03:18.856495 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device
Dec 13 02:03:18.856566 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
Dec 13 02:03:18.856817 kernel: pci 0000:00:01.0: vgaarb: bridge control possible
Dec 13 02:03:18.856832 kernel: vgaarb: loaded
Dec 13 02:03:18.856841 kernel: pps_core: LinuxPPS API ver. 1 registered
Dec 13 02:03:18.856849 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Dec 13 02:03:18.856858 kernel: PTP clock support registered
Dec 13 02:03:18.856864 kernel: PCI: Using ACPI for IRQ routing
Dec 13 02:03:18.856871 kernel: PCI: pci_cache_line_size set to 64 bytes
Dec 13 02:03:18.856878 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff]
Dec 13 02:03:18.856885 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff]
Dec 13 02:03:18.856892 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0
Dec 13 02:03:18.856900 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter
Dec 13 02:03:18.856907 kernel: clocksource: Switched to clocksource kvm-clock
Dec 13 02:03:18.856931 kernel: VFS: Disk quotas dquot_6.6.0
Dec 13 02:03:18.856938 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Dec 13 02:03:18.856945 kernel: pnp: PnP ACPI init
Dec 13 02:03:18.857022 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved
Dec 13 02:03:18.857033 kernel: pnp: PnP ACPI: found 6 devices
Dec 13 02:03:18.857040 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
Dec 13 02:03:18.857049 kernel: NET: Registered PF_INET protocol family
Dec 13 02:03:18.857056 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear)
Dec 13 02:03:18.857063 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear)
Dec 13 02:03:18.857070 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Dec 13 02:03:18.857077 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear)
Dec 13 02:03:18.857084 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear)
Dec 13 02:03:18.857090 kernel: TCP: Hash tables configured (established 32768 bind 32768)
Dec 13 02:03:18.857097 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear)
Dec 13 02:03:18.857105 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear)
Dec 13 02:03:18.857112 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Dec 13 02:03:18.857119 kernel: NET: Registered PF_XDP protocol family
Dec 13 02:03:18.857181 kernel: pci_bus 0000:00: resource 4 [io  0x0000-0x0cf7 window]
Dec 13 02:03:18.857242 kernel: pci_bus 0000:00: resource 5 [io  0x0d00-0xffff window]
Dec 13 02:03:18.857302 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window]
Dec 13 02:03:18.857371 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window]
Dec 13 02:03:18.857432 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window]
Dec 13 02:03:18.857491 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window]
Dec 13 02:03:18.857502 kernel: PCI: CLS 0 bytes, default 64
Dec 13 02:03:18.857509 kernel: Initialise system trusted keyrings
Dec 13 02:03:18.857516 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0
Dec 13 02:03:18.857522 kernel: Key type asymmetric registered
Dec 13 02:03:18.857529 kernel: Asymmetric key parser 'x509' registered
Dec 13 02:03:18.857536 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249)
Dec 13 02:03:18.857543 kernel: io scheduler mq-deadline registered
Dec 13 02:03:18.857549 kernel: io scheduler kyber registered
Dec 13 02:03:18.857556 kernel: io scheduler bfq registered
Dec 13 02:03:18.857564 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00
Dec 13 02:03:18.857571 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22
Dec 13 02:03:18.857578 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23
Dec 13 02:03:18.857585 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20
Dec 13 02:03:18.857592 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Dec 13 02:03:18.857599 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
Dec 13 02:03:18.857606 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12
Dec 13 02:03:18.857613 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1
Dec 13 02:03:18.857620 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12
Dec 13 02:03:18.857699 kernel: rtc_cmos 00:04: RTC can wake from S4
Dec 13 02:03:18.857709 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0
Dec 13 02:03:18.857769 kernel: rtc_cmos 00:04: registered as rtc0
Dec 13 02:03:18.857832 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T02:03:18 UTC (1734055398)
Dec 13 02:03:18.857892 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs
Dec 13 02:03:18.857901 kernel: NET: Registered PF_INET6 protocol family
Dec 13 02:03:18.857917 kernel: Segment Routing with IPv6
Dec 13 02:03:18.857924 kernel: In-situ OAM (IOAM) with IPv6
Dec 13 02:03:18.857934 kernel: NET: Registered PF_PACKET protocol family
Dec 13 02:03:18.857940 kernel: Key type dns_resolver registered
Dec 13 02:03:18.857947 kernel: IPI shorthand broadcast: enabled
Dec 13 02:03:18.857954 kernel: sched_clock: Marking stable (429110532, 108567935)->(584226604, -46548137)
Dec 13 02:03:18.857961 kernel: registered taskstats version 1
Dec 13 02:03:18.857967 kernel: Loading compiled-in X.509 certificates
Dec 13 02:03:18.857974 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e'
Dec 13 02:03:18.857981 kernel: Key type .fscrypt registered
Dec 13 02:03:18.857988 kernel: Key type fscrypt-provisioning registered
Dec 13 02:03:18.857996 kernel: ima: No TPM chip found, activating TPM-bypass!
Dec 13 02:03:18.858003 kernel: ima: Allocated hash algorithm: sha1
Dec 13 02:03:18.858010 kernel: ima: No architecture policies found
Dec 13 02:03:18.858016 kernel: clk: Disabling unused clocks
Dec 13 02:03:18.858023 kernel: Freeing unused kernel image (initmem) memory: 47476K
Dec 13 02:03:18.858030 kernel: Write protecting the kernel read-only data: 28672k
Dec 13 02:03:18.858037 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K
Dec 13 02:03:18.858043 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K
Dec 13 02:03:18.858050 kernel: Run /init as init process
Dec 13 02:03:18.858058 kernel:   with arguments:
Dec 13 02:03:18.858065 kernel:     /init
Dec 13 02:03:18.858072 kernel:   with environment:
Dec 13 02:03:18.858078 kernel:     HOME=/
Dec 13 02:03:18.858085 kernel:     TERM=linux
Dec 13 02:03:18.858091 kernel:     BOOT_IMAGE=/flatcar/vmlinuz-a
Dec 13 02:03:18.858100 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Dec 13 02:03:18.858110 systemd[1]: Detected virtualization kvm.
Dec 13 02:03:18.858118 systemd[1]: Detected architecture x86-64.
Dec 13 02:03:18.858125 systemd[1]: Running in initrd.
Dec 13 02:03:18.858132 systemd[1]: No hostname configured, using default hostname.
Dec 13 02:03:18.858140 systemd[1]: Hostname set to <localhost>.
Dec 13 02:03:18.858149 systemd[1]: Initializing machine ID from VM UUID.
Dec 13 02:03:18.858158 systemd[1]: Queued start job for default target initrd.target.
Dec 13 02:03:18.858167 systemd[1]: Started systemd-ask-password-console.path.
Dec 13 02:03:18.858177 systemd[1]: Reached target cryptsetup.target.
Dec 13 02:03:18.858188 systemd[1]: Reached target paths.target.
Dec 13 02:03:18.858201 systemd[1]: Reached target slices.target.
Dec 13 02:03:18.858210 systemd[1]: Reached target swap.target.
Dec 13 02:03:18.858217 systemd[1]: Reached target timers.target.
Dec 13 02:03:18.858225 systemd[1]: Listening on iscsid.socket.
Dec 13 02:03:18.858234 systemd[1]: Listening on iscsiuio.socket.
Dec 13 02:03:18.858241 systemd[1]: Listening on systemd-journald-audit.socket.
Dec 13 02:03:18.858249 systemd[1]: Listening on systemd-journald-dev-log.socket.
Dec 13 02:03:18.858256 systemd[1]: Listening on systemd-journald.socket.
Dec 13 02:03:18.858264 systemd[1]: Listening on systemd-networkd.socket.
Dec 13 02:03:18.858271 systemd[1]: Listening on systemd-udevd-control.socket.
Dec 13 02:03:18.858279 systemd[1]: Listening on systemd-udevd-kernel.socket.
Dec 13 02:03:18.858286 systemd[1]: Reached target sockets.target.
Dec 13 02:03:18.858293 systemd[1]: Starting kmod-static-nodes.service...
Dec 13 02:03:18.858302 systemd[1]: Finished network-cleanup.service.
Dec 13 02:03:18.858310 systemd[1]: Starting systemd-fsck-usr.service...
Dec 13 02:03:18.858320 systemd[1]: Starting systemd-journald.service...
Dec 13 02:03:18.858335 systemd[1]: Starting systemd-modules-load.service...
Dec 13 02:03:18.858343 systemd[1]: Starting systemd-resolved.service...
Dec 13 02:03:18.858351 systemd[1]: Starting systemd-vconsole-setup.service...
Dec 13 02:03:18.858358 systemd[1]: Finished kmod-static-nodes.service.
Dec 13 02:03:18.858366 systemd[1]: Finished systemd-fsck-usr.service.
Dec 13 02:03:18.858373 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Dec 13 02:03:18.858382 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Dec 13 02:03:18.858392 systemd-journald[197]: Journal started
Dec 13 02:03:18.858429 systemd-journald[197]: Runtime Journal (/run/log/journal/846e1ef1319c408d89c7e02c04dfd5ec) is 6.0M, max 48.5M, 42.5M free.
Dec 13 02:03:18.848303 systemd-modules-load[198]: Inserted module 'overlay'
Dec 13 02:03:18.905702 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Dec 13 02:03:18.905720 systemd[1]: Started systemd-journald.service.
Dec 13 02:03:18.905730 kernel: audit: type=1130 audit(1734055398.887:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:18.905741 kernel: audit: type=1130 audit(1734055398.889:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:18.905750 kernel: audit: type=1130 audit(1734055398.889:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:18.905761 kernel: audit: type=1130 audit(1734055398.889:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:18.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:18.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:18.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:18.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:18.869652 systemd-resolved[199]: Positive Trust Anchors:
Dec 13 02:03:18.869672 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Dec 13 02:03:18.913599 kernel: audit: type=1130 audit(1734055398.908:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:18.914348 kernel: Bridge firewalling registered
Dec 13 02:03:18.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:18.869699 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Dec 13 02:03:18.871772 systemd-resolved[199]: Defaulting to hostname 'linux'.
Dec 13 02:03:18.889296 systemd[1]: Started systemd-resolved.service.
Dec 13 02:03:18.889416 systemd[1]: Reached target nss-lookup.target.
Dec 13 02:03:18.922612 dracut-cmdline[215]: dracut-dracut-053
Dec 13 02:03:18.922612 dracut-cmdline[215]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA
Dec 13 02:03:18.922612 dracut-cmdline[215]: BEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c
Dec 13 02:03:18.890066 systemd[1]: Finished systemd-vconsole-setup.service.
Dec 13 02:03:18.890765 systemd[1]: Starting dracut-cmdline-ask.service...
Dec 13 02:03:18.908636 systemd[1]: Finished dracut-cmdline-ask.service.
Dec 13 02:03:18.910312 systemd[1]: Starting dracut-cmdline.service...
Dec 13 02:03:18.913586 systemd-modules-load[198]: Inserted module 'br_netfilter'
Dec 13 02:03:18.935938 kernel: SCSI subsystem initialized
Dec 13 02:03:18.947071 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
Dec 13 02:03:18.947127 kernel: device-mapper: uevent: version 1.0.3
Dec 13 02:03:18.948451 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com
Dec 13 02:03:18.951253 systemd-modules-load[198]: Inserted module 'dm_multipath'
Dec 13 02:03:18.952221 systemd[1]: Finished systemd-modules-load.service.
Dec 13 02:03:18.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:18.956392 systemd[1]: Starting systemd-sysctl.service...
Dec 13 02:03:18.958787 kernel: audit: type=1130 audit(1734055398.952:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:18.964488 systemd[1]: Finished systemd-sysctl.service.
Dec 13 02:03:18.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:18.968946 kernel: audit: type=1130 audit(1734055398.964:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:18.979930 kernel: Loading iSCSI transport class v2.0-870.
Dec 13 02:03:18.995943 kernel: iscsi: registered transport (tcp)
Dec 13 02:03:19.016954 kernel: iscsi: registered transport (qla4xxx)
Dec 13 02:03:19.017019 kernel: QLogic iSCSI HBA Driver
Dec 13 02:03:19.038397 systemd[1]: Finished dracut-cmdline.service.
Dec 13 02:03:19.042751 kernel: audit: type=1130 audit(1734055399.037:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:19.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:19.042795 systemd[1]: Starting dracut-pre-udev.service...
Dec 13 02:03:19.088948 kernel: raid6: avx2x4   gen() 30745 MB/s
Dec 13 02:03:19.105943 kernel: raid6: avx2x4   xor()  8170 MB/s
Dec 13 02:03:19.122971 kernel: raid6: avx2x2   gen() 31684 MB/s
Dec 13 02:03:19.139962 kernel: raid6: avx2x2   xor() 18585 MB/s
Dec 13 02:03:19.156960 kernel: raid6: avx2x1   gen() 26083 MB/s
Dec 13 02:03:19.173935 kernel: raid6: avx2x1   xor() 15394 MB/s
Dec 13 02:03:19.190936 kernel: raid6: sse2x4   gen() 14825 MB/s
Dec 13 02:03:19.207935 kernel: raid6: sse2x4   xor()  7532 MB/s
Dec 13 02:03:19.224937 kernel: raid6: sse2x2   gen() 16180 MB/s
Dec 13 02:03:19.241932 kernel: raid6: sse2x2   xor()  9830 MB/s
Dec 13 02:03:19.258931 kernel: raid6: sse2x1   gen() 12521 MB/s
Dec 13 02:03:19.276363 kernel: raid6: sse2x1   xor()  7683 MB/s
Dec 13 02:03:19.276384 kernel: raid6: using algorithm avx2x2 gen() 31684 MB/s
Dec 13 02:03:19.276394 kernel: raid6: .... xor() 18585 MB/s, rmw enabled
Dec 13 02:03:19.277117 kernel: raid6: using avx2x2 recovery algorithm
Dec 13 02:03:19.289936 kernel: xor: automatically using best checksumming function   avx       
Dec 13 02:03:19.378939 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no
Dec 13 02:03:19.386531 systemd[1]: Finished dracut-pre-udev.service.
Dec 13 02:03:19.391129 kernel: audit: type=1130 audit(1734055399.385:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:19.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:19.391000 audit: BPF prog-id=7 op=LOAD
Dec 13 02:03:19.391000 audit: BPF prog-id=8 op=LOAD
Dec 13 02:03:19.391527 systemd[1]: Starting systemd-udevd.service...
Dec 13 02:03:19.403945 systemd-udevd[399]: Using default interface naming scheme 'v252'.
Dec 13 02:03:19.408864 systemd[1]: Started systemd-udevd.service.
Dec 13 02:03:19.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:19.409751 systemd[1]: Starting dracut-pre-trigger.service...
Dec 13 02:03:19.419724 dracut-pre-trigger[401]: rd.md=0: removing MD RAID activation
Dec 13 02:03:19.440505 systemd[1]: Finished dracut-pre-trigger.service.
Dec 13 02:03:19.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:19.441344 systemd[1]: Starting systemd-udev-trigger.service...
Dec 13 02:03:19.472651 systemd[1]: Finished systemd-udev-trigger.service.
Dec 13 02:03:19.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:19.507933 kernel: cryptd: max_cpu_qlen set to 1000
Dec 13 02:03:19.507975 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB)
Dec 13 02:03:19.535995 kernel: libata version 3.00 loaded.
Dec 13 02:03:19.536011 kernel: AVX2 version of gcm_enc/dec engaged.
Dec 13 02:03:19.536021 kernel: AES CTR mode by8 optimization enabled
Dec 13 02:03:19.536030 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk.
Dec 13 02:03:19.536039 kernel: GPT:9289727 != 19775487
Dec 13 02:03:19.536051 kernel: GPT:Alternate GPT header not at the end of the disk.
Dec 13 02:03:19.536060 kernel: GPT:9289727 != 19775487
Dec 13 02:03:19.536078 kernel: GPT: Use GNU Parted to correct GPT errors.
Dec 13 02:03:19.536087 kernel:  vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9
Dec 13 02:03:19.536095 kernel: ahci 0000:00:1f.2: version 3.0
Dec 13 02:03:19.546711 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16
Dec 13 02:03:19.546726 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode
Dec 13 02:03:19.546813 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only 
Dec 13 02:03:19.546891 kernel: scsi host0: ahci
Dec 13 02:03:19.547010 kernel: scsi host1: ahci
Dec 13 02:03:19.547094 kernel: scsi host2: ahci
Dec 13 02:03:19.547175 kernel: scsi host3: ahci
Dec 13 02:03:19.547270 kernel: scsi host4: ahci
Dec 13 02:03:19.547366 kernel: scsi host5: ahci
Dec 13 02:03:19.547446 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34
Dec 13 02:03:19.547458 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34
Dec 13 02:03:19.547467 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34
Dec 13 02:03:19.547476 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34
Dec 13 02:03:19.547485 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34
Dec 13 02:03:19.547493 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34
Dec 13 02:03:19.552934 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (455)
Dec 13 02:03:19.555506 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device.
Dec 13 02:03:19.604886 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device.
Dec 13 02:03:19.610631 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device.
Dec 13 02:03:19.611731 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device.
Dec 13 02:03:19.619409 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Dec 13 02:03:19.621146 systemd[1]: Starting disk-uuid.service...
Dec 13 02:03:19.629495 disk-uuid[537]: Primary Header is updated.
Dec 13 02:03:19.629495 disk-uuid[537]: Secondary Entries is updated.
Dec 13 02:03:19.629495 disk-uuid[537]: Secondary Header is updated.
Dec 13 02:03:19.632934 kernel:  vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9
Dec 13 02:03:19.635940 kernel:  vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9
Dec 13 02:03:19.638930 kernel:  vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9
Dec 13 02:03:19.855961 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300)
Dec 13 02:03:19.856040 kernel: ata1: SATA link down (SStatus 0 SControl 300)
Dec 13 02:03:19.856937 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100
Dec 13 02:03:19.857973 kernel: ata3.00: applying bridge limits
Dec 13 02:03:19.858936 kernel: ata3.00: configured for UDMA/100
Dec 13 02:03:19.863951 kernel: ata6: SATA link down (SStatus 0 SControl 300)
Dec 13 02:03:19.864937 kernel: ata4: SATA link down (SStatus 0 SControl 300)
Dec 13 02:03:19.864949 kernel: ata5: SATA link down (SStatus 0 SControl 300)
Dec 13 02:03:19.865939 kernel: ata2: SATA link down (SStatus 0 SControl 300)
Dec 13 02:03:19.866927 kernel: scsi 2:0:0:0: CD-ROM            QEMU     QEMU DVD-ROM     2.5+ PQ: 0 ANSI: 5
Dec 13 02:03:19.895084 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray
Dec 13 02:03:19.912603 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20
Dec 13 02:03:19.912623 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0
Dec 13 02:03:20.642056 kernel:  vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9
Dec 13 02:03:20.642114 disk-uuid[538]: The operation has completed successfully.
Dec 13 02:03:20.661459 systemd[1]: disk-uuid.service: Deactivated successfully.
Dec 13 02:03:20.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:20.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:20.661557 systemd[1]: Finished disk-uuid.service.
Dec 13 02:03:20.672198 systemd[1]: Starting verity-setup.service...
Dec 13 02:03:20.685941 kernel: device-mapper: verity: sha256 using implementation "sha256-ni"
Dec 13 02:03:20.704425 systemd[1]: Found device dev-mapper-usr.device.
Dec 13 02:03:20.705935 systemd[1]: Mounting sysusr-usr.mount...
Dec 13 02:03:20.707504 systemd[1]: Finished verity-setup.service.
Dec 13 02:03:20.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:20.781505 systemd[1]: Mounted sysusr-usr.mount.
Dec 13 02:03:20.783176 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none.
Dec 13 02:03:20.782454 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met.
Dec 13 02:03:20.783187 systemd[1]: Starting ignition-setup.service...
Dec 13 02:03:20.784499 systemd[1]: Starting parse-ip-for-networkd.service...
Dec 13 02:03:20.793132 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm
Dec 13 02:03:20.793161 kernel: BTRFS info (device vda6): using free space tree
Dec 13 02:03:20.793171 kernel: BTRFS info (device vda6): has skinny extents
Dec 13 02:03:20.801743 systemd[1]: mnt-oem.mount: Deactivated successfully.
Dec 13 02:03:20.839614 systemd[1]: Finished parse-ip-for-networkd.service.
Dec 13 02:03:20.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:20.840000 audit: BPF prog-id=9 op=LOAD
Dec 13 02:03:20.841771 systemd[1]: Starting systemd-networkd.service...
Dec 13 02:03:20.860923 systemd-networkd[711]: lo: Link UP
Dec 13 02:03:20.860931 systemd-networkd[711]: lo: Gained carrier
Dec 13 02:03:20.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:20.861389 systemd-networkd[711]: Enumeration completed
Dec 13 02:03:20.861455 systemd[1]: Started systemd-networkd.service.
Dec 13 02:03:20.861576 systemd-networkd[711]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Dec 13 02:03:20.880011 systemd-networkd[711]: eth0: Link UP
Dec 13 02:03:20.880016 systemd-networkd[711]: eth0: Gained carrier
Dec 13 02:03:20.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:20.880631 systemd[1]: Reached target network.target.
Dec 13 02:03:20.882736 systemd[1]: Starting iscsiuio.service...
Dec 13 02:03:20.886698 systemd[1]: Started iscsiuio.service.
Dec 13 02:03:20.888255 systemd[1]: Starting iscsid.service...
Dec 13 02:03:20.891982 iscsid[716]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi
Dec 13 02:03:20.891982 iscsid[716]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier].
Dec 13 02:03:20.891982 iscsid[716]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6.
Dec 13 02:03:20.891982 iscsid[716]: If using hardware iscsi like qla4xxx this message can be ignored.
Dec 13 02:03:20.891982 iscsid[716]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi
Dec 13 02:03:20.891982 iscsid[716]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf
Dec 13 02:03:20.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:20.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:20.892309 systemd[1]: Started iscsid.service.
Dec 13 02:03:20.892962 systemd-networkd[711]: eth0: DHCPv4 address 10.0.0.101/16, gateway 10.0.0.1 acquired from 10.0.0.1
Dec 13 02:03:20.894664 systemd[1]: Starting dracut-initqueue.service...
Dec 13 02:03:20.903569 systemd[1]: Finished dracut-initqueue.service.
Dec 13 02:03:20.924891 systemd[1]: Reached target remote-fs-pre.target.
Dec 13 02:03:20.925740 systemd[1]: Reached target remote-cryptsetup.target.
Dec 13 02:03:20.927228 systemd[1]: Reached target remote-fs.target.
Dec 13 02:03:20.928528 systemd[1]: Starting dracut-pre-mount.service...
Dec 13 02:03:20.936717 systemd[1]: Finished dracut-pre-mount.service.
Dec 13 02:03:20.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:20.968077 systemd[1]: Finished ignition-setup.service.
Dec 13 02:03:20.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:20.969965 systemd[1]: Starting ignition-fetch-offline.service...
Dec 13 02:03:21.004013 ignition[731]: Ignition 2.14.0
Dec 13 02:03:21.004023 ignition[731]: Stage: fetch-offline
Dec 13 02:03:21.004060 ignition[731]: no configs at "/usr/lib/ignition/base.d"
Dec 13 02:03:21.004068 ignition[731]: no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Dec 13 02:03:21.004157 ignition[731]: parsed url from cmdline: ""
Dec 13 02:03:21.004160 ignition[731]: no config URL provided
Dec 13 02:03:21.004164 ignition[731]: reading system config file "/usr/lib/ignition/user.ign"
Dec 13 02:03:21.004170 ignition[731]: no config at "/usr/lib/ignition/user.ign"
Dec 13 02:03:21.004189 ignition[731]: op(1): [started]  loading QEMU firmware config module
Dec 13 02:03:21.004195 ignition[731]: op(1): executing: "modprobe" "qemu_fw_cfg"
Dec 13 02:03:21.009892 ignition[731]: op(1): [finished] loading QEMU firmware config module
Dec 13 02:03:21.012085 ignition[731]: parsing config with SHA512: 1cc7fe4808dd63dafd2797b63d6d0e04d971b5d9487ef40973e8f83faae711d8c506575e4d863db25a7352905344de10efb8bc4471cbd23e850a8e839f138213
Dec 13 02:03:21.015522 unknown[731]: fetched base config from "system"
Dec 13 02:03:21.015538 unknown[731]: fetched user config from "qemu"
Dec 13 02:03:21.015844 ignition[731]: fetch-offline: fetch-offline passed
Dec 13 02:03:21.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:21.016323 systemd-resolved[199]: Detected conflict on linux IN A 10.0.0.101
Dec 13 02:03:21.015929 ignition[731]: Ignition finished successfully
Dec 13 02:03:21.016332 systemd-resolved[199]: Hostname conflict, changing published hostname from 'linux' to 'linux3'.
Dec 13 02:03:21.016767 systemd[1]: Finished ignition-fetch-offline.service.
Dec 13 02:03:21.018431 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json).
Dec 13 02:03:21.019096 systemd[1]: Starting ignition-kargs.service...
Dec 13 02:03:21.026889 ignition[738]: Ignition 2.14.0
Dec 13 02:03:21.026902 ignition[738]: Stage: kargs
Dec 13 02:03:21.026994 ignition[738]: no configs at "/usr/lib/ignition/base.d"
Dec 13 02:03:21.028681 systemd[1]: Finished ignition-kargs.service.
Dec 13 02:03:21.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:21.027002 ignition[738]: no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Dec 13 02:03:21.031080 systemd[1]: Starting ignition-disks.service...
Dec 13 02:03:21.027662 ignition[738]: kargs: kargs passed
Dec 13 02:03:21.027696 ignition[738]: Ignition finished successfully
Dec 13 02:03:21.036356 ignition[744]: Ignition 2.14.0
Dec 13 02:03:21.036368 ignition[744]: Stage: disks
Dec 13 02:03:21.036443 ignition[744]: no configs at "/usr/lib/ignition/base.d"
Dec 13 02:03:21.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:21.037587 systemd[1]: Finished ignition-disks.service.
Dec 13 02:03:21.036451 ignition[744]: no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Dec 13 02:03:21.038961 systemd[1]: Reached target initrd-root-device.target.
Dec 13 02:03:21.037107 ignition[744]: disks: disks passed
Dec 13 02:03:21.040994 systemd[1]: Reached target local-fs-pre.target.
Dec 13 02:03:21.037142 ignition[744]: Ignition finished successfully
Dec 13 02:03:21.042025 systemd[1]: Reached target local-fs.target.
Dec 13 02:03:21.042972 systemd[1]: Reached target sysinit.target.
Dec 13 02:03:21.043922 systemd[1]: Reached target basic.target.
Dec 13 02:03:21.044770 systemd[1]: Starting systemd-fsck-root.service...
Dec 13 02:03:21.060871 systemd-fsck[752]: ROOT: clean, 621/553520 files, 56021/553472 blocks
Dec 13 02:03:21.276716 systemd[1]: Finished systemd-fsck-root.service.
Dec 13 02:03:21.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:21.278764 systemd[1]: Mounting sysroot.mount...
Dec 13 02:03:21.300932 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none.
Dec 13 02:03:21.301622 systemd[1]: Mounted sysroot.mount.
Dec 13 02:03:21.303082 systemd[1]: Reached target initrd-root-fs.target.
Dec 13 02:03:21.305602 systemd[1]: Mounting sysroot-usr.mount...
Dec 13 02:03:21.307245 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met.
Dec 13 02:03:21.307287 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot).
Dec 13 02:03:21.307305 systemd[1]: Reached target ignition-diskful.target.
Dec 13 02:03:21.312632 systemd[1]: Mounted sysroot-usr.mount.
Dec 13 02:03:21.314633 systemd[1]: Starting initrd-setup-root.service...
Dec 13 02:03:21.318255 initrd-setup-root[762]: cut: /sysroot/etc/passwd: No such file or directory
Dec 13 02:03:21.334242 initrd-setup-root[770]: cut: /sysroot/etc/group: No such file or directory
Dec 13 02:03:21.337270 initrd-setup-root[778]: cut: /sysroot/etc/shadow: No such file or directory
Dec 13 02:03:21.340748 initrd-setup-root[786]: cut: /sysroot/etc/gshadow: No such file or directory
Dec 13 02:03:21.364281 systemd[1]: Finished initrd-setup-root.service.
Dec 13 02:03:21.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:21.366700 systemd[1]: Starting ignition-mount.service...
Dec 13 02:03:21.368717 systemd[1]: Starting sysroot-boot.service...
Dec 13 02:03:21.371290 bash[803]: umount: /sysroot/usr/share/oem: not mounted.
Dec 13 02:03:21.378748 ignition[804]: INFO     : Ignition 2.14.0
Dec 13 02:03:21.379771 ignition[804]: INFO     : Stage: mount
Dec 13 02:03:21.379771 ignition[804]: INFO     : no configs at "/usr/lib/ignition/base.d"
Dec 13 02:03:21.379771 ignition[804]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Dec 13 02:03:21.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:21.383772 ignition[804]: INFO     : mount: mount passed
Dec 13 02:03:21.383772 ignition[804]: INFO     : Ignition finished successfully
Dec 13 02:03:21.381210 systemd[1]: Finished ignition-mount.service.
Dec 13 02:03:21.386785 systemd[1]: Finished sysroot-boot.service.
Dec 13 02:03:21.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:21.714809 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Dec 13 02:03:21.721936 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (812)
Dec 13 02:03:21.724136 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm
Dec 13 02:03:21.724165 kernel: BTRFS info (device vda6): using free space tree
Dec 13 02:03:21.724178 kernel: BTRFS info (device vda6): has skinny extents
Dec 13 02:03:21.728545 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Dec 13 02:03:21.729832 systemd[1]: Starting ignition-files.service...
Dec 13 02:03:21.742458 ignition[832]: INFO     : Ignition 2.14.0
Dec 13 02:03:21.742458 ignition[832]: INFO     : Stage: files
Dec 13 02:03:21.744684 ignition[832]: INFO     : no configs at "/usr/lib/ignition/base.d"
Dec 13 02:03:21.744684 ignition[832]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Dec 13 02:03:21.744684 ignition[832]: DEBUG    : files: compiled without relabeling support, skipping
Dec 13 02:03:21.744684 ignition[832]: INFO     : files: ensureUsers: op(1): [started]  creating or modifying user "core"
Dec 13 02:03:21.744684 ignition[832]: DEBUG    : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core"
Dec 13 02:03:21.751719 ignition[832]: INFO     : files: ensureUsers: op(1): [finished] creating or modifying user "core"
Dec 13 02:03:21.753108 ignition[832]: INFO     : files: ensureUsers: op(2): [started]  adding ssh keys to user "core"
Dec 13 02:03:21.754654 unknown[832]: wrote ssh authorized keys file for user: core
Dec 13 02:03:21.755726 ignition[832]: INFO     : files: ensureUsers: op(2): [finished] adding ssh keys to user "core"
Dec 13 02:03:21.757292 ignition[832]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [started]  writing file "/sysroot/home/core/install.sh"
Dec 13 02:03:21.757292 ignition[832]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh"
Dec 13 02:03:21.757292 ignition[832]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [started]  writing file "/sysroot/etc/flatcar/update.conf"
Dec 13 02:03:21.757292 ignition[832]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf"
Dec 13 02:03:21.757292 ignition[832]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [started]  writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw"
Dec 13 02:03:21.757292 ignition[832]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw"
Dec 13 02:03:21.757292 ignition[832]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [started]  writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw"
Dec 13 02:03:21.757292 ignition[832]: INFO     : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1
Dec 13 02:03:22.130208 ignition[832]: INFO     : files: createFilesystemsFiles: createFiles: op(6): GET result: OK
Dec 13 02:03:22.241074 systemd-networkd[711]: eth0: Gained IPv6LL
Dec 13 02:03:22.494993 ignition[832]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw"
Dec 13 02:03:22.494993 ignition[832]: INFO     : files: op(7): [started]  processing unit "coreos-metadata.service"
Dec 13 02:03:22.498938 ignition[832]: INFO     : files: op(7): op(8): [started]  writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service"
Dec 13 02:03:22.501150 ignition[832]: INFO     : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service"
Dec 13 02:03:22.501150 ignition[832]: INFO     : files: op(7): [finished] processing unit "coreos-metadata.service"
Dec 13 02:03:22.504739 ignition[832]: INFO     : files: op(9): [started]  setting preset to disabled for "coreos-metadata.service"
Dec 13 02:03:22.504739 ignition[832]: INFO     : files: op(9): op(a): [started]  removing enablement symlink(s) for "coreos-metadata.service"
Dec 13 02:03:22.523150 ignition[832]: INFO     : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service"
Dec 13 02:03:22.524892 ignition[832]: INFO     : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service"
Dec 13 02:03:22.524892 ignition[832]: INFO     : files: createResultFile: createFiles: op(b): [started]  writing file "/sysroot/etc/.ignition-result.json"
Dec 13 02:03:22.524892 ignition[832]: INFO     : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json"
Dec 13 02:03:22.524892 ignition[832]: INFO     : files: files passed
Dec 13 02:03:22.524892 ignition[832]: INFO     : Ignition finished successfully
Dec 13 02:03:22.532688 systemd[1]: Finished ignition-files.service.
Dec 13 02:03:22.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.534401 systemd[1]: Starting initrd-setup-root-after-ignition.service...
Dec 13 02:03:22.534815 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile).
Dec 13 02:03:22.535343 systemd[1]: Starting ignition-quench.service...
Dec 13 02:03:22.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.538601 systemd[1]: ignition-quench.service: Deactivated successfully.
Dec 13 02:03:22.538666 systemd[1]: Finished ignition-quench.service.
Dec 13 02:03:22.544875 initrd-setup-root-after-ignition[857]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory
Dec 13 02:03:22.547574 initrd-setup-root-after-ignition[859]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory
Dec 13 02:03:22.548200 systemd[1]: Finished initrd-setup-root-after-ignition.service.
Dec 13 02:03:22.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.548507 systemd[1]: Reached target ignition-complete.target.
Dec 13 02:03:22.552065 systemd[1]: Starting initrd-parse-etc.service...
Dec 13 02:03:22.563857 systemd[1]: initrd-parse-etc.service: Deactivated successfully.
Dec 13 02:03:22.563952 systemd[1]: Finished initrd-parse-etc.service.
Dec 13 02:03:22.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.565757 systemd[1]: Reached target initrd-fs.target.
Dec 13 02:03:22.567155 systemd[1]: Reached target initrd.target.
Dec 13 02:03:22.567603 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met.
Dec 13 02:03:22.568733 systemd[1]: Starting dracut-pre-pivot.service...
Dec 13 02:03:22.580687 systemd[1]: Finished dracut-pre-pivot.service.
Dec 13 02:03:22.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.582720 systemd[1]: Starting initrd-cleanup.service...
Dec 13 02:03:22.591435 systemd[1]: Stopped target nss-lookup.target.
Dec 13 02:03:22.591933 systemd[1]: Stopped target remote-cryptsetup.target.
Dec 13 02:03:22.593459 systemd[1]: Stopped target timers.target.
Dec 13 02:03:22.595358 systemd[1]: dracut-pre-pivot.service: Deactivated successfully.
Dec 13 02:03:22.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.595438 systemd[1]: Stopped dracut-pre-pivot.service.
Dec 13 02:03:22.596724 systemd[1]: Stopped target initrd.target.
Dec 13 02:03:22.598477 systemd[1]: Stopped target basic.target.
Dec 13 02:03:22.600200 systemd[1]: Stopped target ignition-complete.target.
Dec 13 02:03:22.601522 systemd[1]: Stopped target ignition-diskful.target.
Dec 13 02:03:22.603347 systemd[1]: Stopped target initrd-root-device.target.
Dec 13 02:03:22.604890 systemd[1]: Stopped target remote-fs.target.
Dec 13 02:03:22.606773 systemd[1]: Stopped target remote-fs-pre.target.
Dec 13 02:03:22.608214 systemd[1]: Stopped target sysinit.target.
Dec 13 02:03:22.610007 systemd[1]: Stopped target local-fs.target.
Dec 13 02:03:22.611578 systemd[1]: Stopped target local-fs-pre.target.
Dec 13 02:03:22.613306 systemd[1]: Stopped target swap.target.
Dec 13 02:03:22.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.614690 systemd[1]: dracut-pre-mount.service: Deactivated successfully.
Dec 13 02:03:22.614767 systemd[1]: Stopped dracut-pre-mount.service.
Dec 13 02:03:22.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.616349 systemd[1]: Stopped target cryptsetup.target.
Dec 13 02:03:22.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.618020 systemd[1]: dracut-initqueue.service: Deactivated successfully.
Dec 13 02:03:22.618103 systemd[1]: Stopped dracut-initqueue.service.
Dec 13 02:03:22.619748 systemd[1]: ignition-fetch-offline.service: Deactivated successfully.
Dec 13 02:03:22.619824 systemd[1]: Stopped ignition-fetch-offline.service.
Dec 13 02:03:22.621363 systemd[1]: Stopped target paths.target.
Dec 13 02:03:22.622686 systemd[1]: systemd-ask-password-console.path: Deactivated successfully.
Dec 13 02:03:22.625965 systemd[1]: Stopped systemd-ask-password-console.path.
Dec 13 02:03:22.627328 systemd[1]: Stopped target slices.target.
Dec 13 02:03:22.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.628692 systemd[1]: Stopped target sockets.target.
Dec 13 02:03:22.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.630510 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully.
Dec 13 02:03:22.636532 iscsid[716]: iscsid shutting down.
Dec 13 02:03:22.630625 systemd[1]: Stopped initrd-setup-root-after-ignition.service.
Dec 13 02:03:22.632293 systemd[1]: ignition-files.service: Deactivated successfully.
Dec 13 02:03:22.632396 systemd[1]: Stopped ignition-files.service.
Dec 13 02:03:22.633493 systemd[1]: Stopping ignition-mount.service...
Dec 13 02:03:22.642801 ignition[872]: INFO     : Ignition 2.14.0
Dec 13 02:03:22.642801 ignition[872]: INFO     : Stage: umount
Dec 13 02:03:22.642801 ignition[872]: INFO     : no configs at "/usr/lib/ignition/base.d"
Dec 13 02:03:22.642801 ignition[872]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Dec 13 02:03:22.642801 ignition[872]: INFO     : umount: umount passed
Dec 13 02:03:22.642801 ignition[872]: INFO     : Ignition finished successfully
Dec 13 02:03:22.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.635010 systemd[1]: Stopping iscsid.service...
Dec 13 02:03:22.637927 systemd[1]: kmod-static-nodes.service: Deactivated successfully.
Dec 13 02:03:22.641079 systemd[1]: Stopped kmod-static-nodes.service.
Dec 13 02:03:22.665507 systemd[1]: Stopping sysroot-boot.service...
Dec 13 02:03:22.666982 systemd[1]: systemd-udev-trigger.service: Deactivated successfully.
Dec 13 02:03:22.668283 systemd[1]: Stopped systemd-udev-trigger.service.
Dec 13 02:03:22.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.670397 systemd[1]: dracut-pre-trigger.service: Deactivated successfully.
Dec 13 02:03:22.671581 systemd[1]: Stopped dracut-pre-trigger.service.
Dec 13 02:03:22.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.674638 systemd[1]: iscsid.service: Deactivated successfully.
Dec 13 02:03:22.675594 systemd[1]: Stopped iscsid.service.
Dec 13 02:03:22.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.677321 systemd[1]: ignition-mount.service: Deactivated successfully.
Dec 13 02:03:22.678530 systemd[1]: Stopped ignition-mount.service.
Dec 13 02:03:22.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.680948 systemd[1]: sysroot-boot.mount: Deactivated successfully.
Dec 13 02:03:22.682245 systemd[1]: iscsid.socket: Deactivated successfully.
Dec 13 02:03:22.683101 systemd[1]: Closed iscsid.socket.
Dec 13 02:03:22.684389 systemd[1]: ignition-disks.service: Deactivated successfully.
Dec 13 02:03:22.685291 systemd[1]: Stopped ignition-disks.service.
Dec 13 02:03:22.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.686810 systemd[1]: ignition-kargs.service: Deactivated successfully.
Dec 13 02:03:22.686842 systemd[1]: Stopped ignition-kargs.service.
Dec 13 02:03:22.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.689167 systemd[1]: ignition-setup.service: Deactivated successfully.
Dec 13 02:03:22.689198 systemd[1]: Stopped ignition-setup.service.
Dec 13 02:03:22.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.691617 systemd[1]: Stopping iscsiuio.service...
Dec 13 02:03:22.693138 systemd[1]: initrd-cleanup.service: Deactivated successfully.
Dec 13 02:03:22.709460 systemd[1]: Finished initrd-cleanup.service.
Dec 13 02:03:22.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.711172 systemd[1]: iscsiuio.service: Deactivated successfully.
Dec 13 02:03:22.712102 systemd[1]: Stopped iscsiuio.service.
Dec 13 02:03:22.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.714105 systemd[1]: Stopped target network.target.
Dec 13 02:03:22.715583 systemd[1]: iscsiuio.socket: Deactivated successfully.
Dec 13 02:03:22.715612 systemd[1]: Closed iscsiuio.socket.
Dec 13 02:03:22.717943 systemd[1]: Stopping systemd-networkd.service...
Dec 13 02:03:22.719470 systemd[1]: Stopping systemd-resolved.service...
Dec 13 02:03:22.722943 systemd-networkd[711]: eth0: DHCPv6 lease lost
Dec 13 02:03:22.724085 systemd[1]: systemd-resolved.service: Deactivated successfully.
Dec 13 02:03:22.725286 systemd[1]: Stopped systemd-resolved.service.
Dec 13 02:03:22.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.727602 systemd[1]: systemd-networkd.service: Deactivated successfully.
Dec 13 02:03:22.727674 systemd[1]: Stopped systemd-networkd.service.
Dec 13 02:03:22.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.730588 systemd[1]: systemd-networkd.socket: Deactivated successfully.
Dec 13 02:03:22.730617 systemd[1]: Closed systemd-networkd.socket.
Dec 13 02:03:22.736000 audit: BPF prog-id=6 op=UNLOAD
Dec 13 02:03:22.737000 audit: BPF prog-id=9 op=UNLOAD
Dec 13 02:03:22.739076 systemd[1]: Stopping network-cleanup.service...
Dec 13 02:03:22.740889 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully.
Dec 13 02:03:22.740954 systemd[1]: Stopped parse-ip-for-networkd.service.
Dec 13 02:03:22.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.743610 systemd[1]: systemd-sysctl.service: Deactivated successfully.
Dec 13 02:03:22.743639 systemd[1]: Stopped systemd-sysctl.service.
Dec 13 02:03:22.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.746574 systemd[1]: systemd-modules-load.service: Deactivated successfully.
Dec 13 02:03:22.747639 systemd[1]: Stopped systemd-modules-load.service.
Dec 13 02:03:22.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.749571 systemd[1]: Stopping systemd-udevd.service...
Dec 13 02:03:22.752625 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully.
Dec 13 02:03:22.755733 systemd[1]: network-cleanup.service: Deactivated successfully.
Dec 13 02:03:22.756728 systemd[1]: Stopped network-cleanup.service.
Dec 13 02:03:22.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.758726 systemd[1]: systemd-udevd.service: Deactivated successfully.
Dec 13 02:03:22.759714 systemd[1]: Stopped systemd-udevd.service.
Dec 13 02:03:22.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.761575 systemd[1]: systemd-udevd-control.socket: Deactivated successfully.
Dec 13 02:03:22.761606 systemd[1]: Closed systemd-udevd-control.socket.
Dec 13 02:03:22.764387 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully.
Dec 13 02:03:22.764413 systemd[1]: Closed systemd-udevd-kernel.socket.
Dec 13 02:03:22.766900 systemd[1]: dracut-pre-udev.service: Deactivated successfully.
Dec 13 02:03:22.767805 systemd[1]: Stopped dracut-pre-udev.service.
Dec 13 02:03:22.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.769343 systemd[1]: dracut-cmdline.service: Deactivated successfully.
Dec 13 02:03:22.769372 systemd[1]: Stopped dracut-cmdline.service.
Dec 13 02:03:22.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.771843 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully.
Dec 13 02:03:22.771877 systemd[1]: Stopped dracut-cmdline-ask.service.
Dec 13 02:03:22.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.775083 systemd[1]: Starting initrd-udevadm-cleanup-db.service...
Dec 13 02:03:22.777114 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully.
Dec 13 02:03:22.778312 systemd[1]: Stopped systemd-vconsole-setup.service.
Dec 13 02:03:22.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.780755 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully.
Dec 13 02:03:22.782153 systemd[1]: Finished initrd-udevadm-cleanup-db.service.
Dec 13 02:03:22.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.802205 systemd[1]: sysroot-boot.service: Deactivated successfully.
Dec 13 02:03:22.802305 systemd[1]: Stopped sysroot-boot.service.
Dec 13 02:03:22.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.804793 systemd[1]: Reached target initrd-switch-root.target.
Dec 13 02:03:22.806514 systemd[1]: initrd-setup-root.service: Deactivated successfully.
Dec 13 02:03:22.807474 systemd[1]: Stopped initrd-setup-root.service.
Dec 13 02:03:22.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:22.809685 systemd[1]: Starting initrd-switch-root.service...
Dec 13 02:03:22.825600 systemd[1]: Switching root.
Dec 13 02:03:22.844483 systemd-journald[197]: Journal stopped
Dec 13 02:03:25.591842 systemd-journald[197]: Received SIGTERM from PID 1 (systemd).
Dec 13 02:03:25.591888 kernel: SELinux:  Class mctp_socket not defined in policy.
Dec 13 02:03:25.591905 kernel: SELinux:  Class anon_inode not defined in policy.
Dec 13 02:03:25.591932 kernel: SELinux: the above unknown classes and permissions will be allowed
Dec 13 02:03:25.591942 kernel: SELinux:  policy capability network_peer_controls=1
Dec 13 02:03:25.591952 kernel: SELinux:  policy capability open_perms=1
Dec 13 02:03:25.591961 kernel: SELinux:  policy capability extended_socket_class=1
Dec 13 02:03:25.591971 kernel: SELinux:  policy capability always_check_network=0
Dec 13 02:03:25.591981 kernel: SELinux:  policy capability cgroup_seclabel=1
Dec 13 02:03:25.591990 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Dec 13 02:03:25.592001 kernel: SELinux:  policy capability genfs_seclabel_symlinks=0
Dec 13 02:03:25.592011 kernel: SELinux:  policy capability ioctl_skip_cloexec=0
Dec 13 02:03:25.592021 systemd[1]: Successfully loaded SELinux policy in 40.387ms.
Dec 13 02:03:25.592037 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.525ms.
Dec 13 02:03:25.592051 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Dec 13 02:03:25.592062 systemd[1]: Detected virtualization kvm.
Dec 13 02:03:25.592073 systemd[1]: Detected architecture x86-64.
Dec 13 02:03:25.592083 systemd[1]: Detected first boot.
Dec 13 02:03:25.592095 systemd[1]: Initializing machine ID from VM UUID.
Dec 13 02:03:25.592105 kernel: kauditd_printk_skb: 65 callbacks suppressed
Dec 13 02:03:25.592116 kernel: audit: type=1400 audit(1734055403.198:76): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Dec 13 02:03:25.592129 kernel: audit: type=1400 audit(1734055403.198:77): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Dec 13 02:03:25.592147 kernel: audit: type=1334 audit(1734055403.199:78): prog-id=10 op=LOAD
Dec 13 02:03:25.592158 kernel: audit: type=1334 audit(1734055403.199:79): prog-id=10 op=UNLOAD
Dec 13 02:03:25.592168 kernel: audit: type=1334 audit(1734055403.202:80): prog-id=11 op=LOAD
Dec 13 02:03:25.592178 kernel: audit: type=1334 audit(1734055403.202:81): prog-id=11 op=UNLOAD
Dec 13 02:03:25.592189 kernel: SELinux:  Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped).
Dec 13 02:03:25.592199 kernel: audit: type=1400 audit(1734055403.233:82): avc:  denied  { associate } for  pid=906 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023"
Dec 13 02:03:25.592210 kernel: audit: type=1300 audit(1734055403.233:82): arch=c000003e syscall=188 success=yes exit=0 a0=c00018f8e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=889 pid=906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:25.592220 kernel: audit: type=1327 audit(1734055403.233:82): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Dec 13 02:03:25.592230 kernel: audit: type=1400 audit(1734055403.235:83): avc:  denied  { associate } for  pid=906 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1
Dec 13 02:03:25.592242 systemd[1]: Populated /etc with preset unit settings.
Dec 13 02:03:25.592265 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Dec 13 02:03:25.592282 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Dec 13 02:03:25.592296 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Dec 13 02:03:25.592309 systemd[1]: initrd-switch-root.service: Deactivated successfully.
Dec 13 02:03:25.592322 systemd[1]: Stopped initrd-switch-root.service.
Dec 13 02:03:25.592333 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Dec 13 02:03:25.592344 systemd[1]: Created slice system-addon\x2dconfig.slice.
Dec 13 02:03:25.592357 systemd[1]: Created slice system-addon\x2drun.slice.
Dec 13 02:03:25.592368 systemd[1]: Created slice system-getty.slice.
Dec 13 02:03:25.592379 systemd[1]: Created slice system-modprobe.slice.
Dec 13 02:03:25.592393 systemd[1]: Created slice system-serial\x2dgetty.slice.
Dec 13 02:03:25.592404 systemd[1]: Created slice system-system\x2dcloudinit.slice.
Dec 13 02:03:25.592414 systemd[1]: Created slice system-systemd\x2dfsck.slice.
Dec 13 02:03:25.592424 systemd[1]: Created slice user.slice.
Dec 13 02:03:25.592434 systemd[1]: Started systemd-ask-password-console.path.
Dec 13 02:03:25.592446 systemd[1]: Started systemd-ask-password-wall.path.
Dec 13 02:03:25.592457 systemd[1]: Set up automount boot.automount.
Dec 13 02:03:25.592468 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount.
Dec 13 02:03:25.592479 systemd[1]: Stopped target initrd-switch-root.target.
Dec 13 02:03:25.592490 systemd[1]: Stopped target initrd-fs.target.
Dec 13 02:03:25.592501 systemd[1]: Stopped target initrd-root-fs.target.
Dec 13 02:03:25.592513 systemd[1]: Reached target integritysetup.target.
Dec 13 02:03:25.592523 systemd[1]: Reached target remote-cryptsetup.target.
Dec 13 02:03:25.592534 systemd[1]: Reached target remote-fs.target.
Dec 13 02:03:25.592545 systemd[1]: Reached target slices.target.
Dec 13 02:03:25.592555 systemd[1]: Reached target swap.target.
Dec 13 02:03:25.592565 systemd[1]: Reached target torcx.target.
Dec 13 02:03:25.592576 systemd[1]: Reached target veritysetup.target.
Dec 13 02:03:25.592586 systemd[1]: Listening on systemd-coredump.socket.
Dec 13 02:03:25.592596 systemd[1]: Listening on systemd-initctl.socket.
Dec 13 02:03:25.592608 systemd[1]: Listening on systemd-networkd.socket.
Dec 13 02:03:25.592618 systemd[1]: Listening on systemd-udevd-control.socket.
Dec 13 02:03:25.592628 systemd[1]: Listening on systemd-udevd-kernel.socket.
Dec 13 02:03:25.592639 systemd[1]: Listening on systemd-userdbd.socket.
Dec 13 02:03:25.592649 systemd[1]: Mounting dev-hugepages.mount...
Dec 13 02:03:25.592660 systemd[1]: Mounting dev-mqueue.mount...
Dec 13 02:03:25.592670 systemd[1]: Mounting media.mount...
Dec 13 02:03:25.592681 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:03:25.592692 systemd[1]: Mounting sys-kernel-debug.mount...
Dec 13 02:03:25.592706 systemd[1]: Mounting sys-kernel-tracing.mount...
Dec 13 02:03:25.592716 systemd[1]: Mounting tmp.mount...
Dec 13 02:03:25.592726 systemd[1]: Starting flatcar-tmpfiles.service...
Dec 13 02:03:25.592738 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Dec 13 02:03:25.592748 systemd[1]: Starting kmod-static-nodes.service...
Dec 13 02:03:25.592758 systemd[1]: Starting modprobe@configfs.service...
Dec 13 02:03:25.592769 systemd[1]: Starting modprobe@dm_mod.service...
Dec 13 02:03:25.592779 systemd[1]: Starting modprobe@drm.service...
Dec 13 02:03:25.592789 systemd[1]: Starting modprobe@efi_pstore.service...
Dec 13 02:03:25.592801 systemd[1]: Starting modprobe@fuse.service...
Dec 13 02:03:25.592811 systemd[1]: Starting modprobe@loop.service...
Dec 13 02:03:25.592822 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf).
Dec 13 02:03:25.592833 systemd[1]: systemd-fsck-root.service: Deactivated successfully.
Dec 13 02:03:25.592843 systemd[1]: Stopped systemd-fsck-root.service.
Dec 13 02:03:25.592853 systemd[1]: systemd-fsck-usr.service: Deactivated successfully.
Dec 13 02:03:25.592863 kernel: loop: module loaded
Dec 13 02:03:25.592873 systemd[1]: Stopped systemd-fsck-usr.service.
Dec 13 02:03:25.592883 systemd[1]: Stopped systemd-journald.service.
Dec 13 02:03:25.592894 kernel: fuse: init (API version 7.34)
Dec 13 02:03:25.592905 systemd[1]: Starting systemd-journald.service...
Dec 13 02:03:25.592928 systemd[1]: Starting systemd-modules-load.service...
Dec 13 02:03:25.592938 systemd[1]: Starting systemd-network-generator.service...
Dec 13 02:03:25.592949 systemd[1]: Starting systemd-remount-fs.service...
Dec 13 02:03:25.592959 systemd[1]: Starting systemd-udev-trigger.service...
Dec 13 02:03:25.592969 systemd[1]: verity-setup.service: Deactivated successfully.
Dec 13 02:03:25.592979 systemd[1]: Stopped verity-setup.service.
Dec 13 02:03:25.592990 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:03:25.593004 systemd-journald[991]: Journal started
Dec 13 02:03:25.593041 systemd-journald[991]: Runtime Journal (/run/log/journal/846e1ef1319c408d89c7e02c04dfd5ec) is 6.0M, max 48.5M, 42.5M free.
Dec 13 02:03:22.903000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1
Dec 13 02:03:23.198000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Dec 13 02:03:23.198000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Dec 13 02:03:23.199000 audit: BPF prog-id=10 op=LOAD
Dec 13 02:03:23.199000 audit: BPF prog-id=10 op=UNLOAD
Dec 13 02:03:23.202000 audit: BPF prog-id=11 op=LOAD
Dec 13 02:03:23.202000 audit: BPF prog-id=11 op=UNLOAD
Dec 13 02:03:23.233000 audit[906]: AVC avc:  denied  { associate } for  pid=906 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023"
Dec 13 02:03:23.233000 audit[906]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00018f8e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=889 pid=906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:23.233000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Dec 13 02:03:23.235000 audit[906]: AVC avc:  denied  { associate } for  pid=906 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1
Dec 13 02:03:23.235000 audit[906]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000096000 a2=1ed a3=0 items=2 ppid=889 pid=906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:23.235000 audit: CWD cwd="/"
Dec 13 02:03:23.235000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:23.235000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:23.235000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Dec 13 02:03:25.462000 audit: BPF prog-id=12 op=LOAD
Dec 13 02:03:25.462000 audit: BPF prog-id=3 op=UNLOAD
Dec 13 02:03:25.462000 audit: BPF prog-id=13 op=LOAD
Dec 13 02:03:25.462000 audit: BPF prog-id=14 op=LOAD
Dec 13 02:03:25.462000 audit: BPF prog-id=4 op=UNLOAD
Dec 13 02:03:25.462000 audit: BPF prog-id=5 op=UNLOAD
Dec 13 02:03:25.463000 audit: BPF prog-id=15 op=LOAD
Dec 13 02:03:25.463000 audit: BPF prog-id=12 op=UNLOAD
Dec 13 02:03:25.463000 audit: BPF prog-id=16 op=LOAD
Dec 13 02:03:25.463000 audit: BPF prog-id=17 op=LOAD
Dec 13 02:03:25.463000 audit: BPF prog-id=13 op=UNLOAD
Dec 13 02:03:25.463000 audit: BPF prog-id=14 op=UNLOAD
Dec 13 02:03:25.463000 audit: BPF prog-id=18 op=LOAD
Dec 13 02:03:25.463000 audit: BPF prog-id=15 op=UNLOAD
Dec 13 02:03:25.464000 audit: BPF prog-id=19 op=LOAD
Dec 13 02:03:25.464000 audit: BPF prog-id=20 op=LOAD
Dec 13 02:03:25.464000 audit: BPF prog-id=16 op=UNLOAD
Dec 13 02:03:25.464000 audit: BPF prog-id=17 op=UNLOAD
Dec 13 02:03:25.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.473000 audit: BPF prog-id=18 op=UNLOAD
Dec 13 02:03:25.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.571000 audit: BPF prog-id=21 op=LOAD
Dec 13 02:03:25.571000 audit: BPF prog-id=22 op=LOAD
Dec 13 02:03:25.572000 audit: BPF prog-id=23 op=LOAD
Dec 13 02:03:25.572000 audit: BPF prog-id=19 op=UNLOAD
Dec 13 02:03:25.572000 audit: BPF prog-id=20 op=UNLOAD
Dec 13 02:03:25.589000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1
Dec 13 02:03:25.589000 audit[991]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd465eb6d0 a2=4000 a3=7ffd465eb76c items=0 ppid=1 pid=991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:25.589000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald"
Dec 13 02:03:25.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.461834 systemd[1]: Queued start job for default target multi-user.target.
Dec 13 02:03:23.233167 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]"
Dec 13 02:03:25.461844 systemd[1]: Unnecessary job was removed for dev-vda6.device.
Dec 13 02:03:23.233363 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Dec 13 02:03:25.465246 systemd[1]: systemd-journald.service: Deactivated successfully.
Dec 13 02:03:23.233379 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Dec 13 02:03:23.233404 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:23Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12"
Dec 13 02:03:23.233412 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:23Z" level=debug msg="skipped missing lower profile" missing profile=oem
Dec 13 02:03:23.233436 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:23Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory"
Dec 13 02:03:23.233447 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:23Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)=
Dec 13 02:03:23.233620 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:23Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack
Dec 13 02:03:23.233648 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Dec 13 02:03:23.233659 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Dec 13 02:03:23.234231 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10
Dec 13 02:03:23.234260 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl
Dec 13 02:03:23.234274 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6
Dec 13 02:03:25.596176 systemd[1]: Started systemd-journald.service.
Dec 13 02:03:25.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:23.234286 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store
Dec 13 02:03:23.234300 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6
Dec 13 02:03:23.234312 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store
Dec 13 02:03:25.166331 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:25Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Dec 13 02:03:25.166569 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:25Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Dec 13 02:03:25.596548 systemd[1]: Mounted dev-hugepages.mount.
Dec 13 02:03:25.166657 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:25Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Dec 13 02:03:25.597449 systemd[1]: Mounted dev-mqueue.mount.
Dec 13 02:03:25.166800 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:25Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Dec 13 02:03:25.166844 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:25Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile=
Dec 13 02:03:25.166894 /usr/lib/systemd/system-generators/torcx-generator[906]: time="2024-12-13T02:03:25Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx
Dec 13 02:03:25.598272 systemd[1]: Mounted media.mount.
Dec 13 02:03:25.599028 systemd[1]: Mounted sys-kernel-debug.mount.
Dec 13 02:03:25.599901 systemd[1]: Mounted sys-kernel-tracing.mount.
Dec 13 02:03:25.600810 systemd[1]: Mounted tmp.mount.
Dec 13 02:03:25.601669 systemd[1]: Finished flatcar-tmpfiles.service.
Dec 13 02:03:25.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.602736 systemd[1]: Finished kmod-static-nodes.service.
Dec 13 02:03:25.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.603831 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Dec 13 02:03:25.603964 systemd[1]: Finished modprobe@configfs.service.
Dec 13 02:03:25.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.605109 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Dec 13 02:03:25.605242 systemd[1]: Finished modprobe@dm_mod.service.
Dec 13 02:03:25.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.606351 systemd[1]: modprobe@drm.service: Deactivated successfully.
Dec 13 02:03:25.606468 systemd[1]: Finished modprobe@drm.service.
Dec 13 02:03:25.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.607543 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Dec 13 02:03:25.607657 systemd[1]: Finished modprobe@efi_pstore.service.
Dec 13 02:03:25.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.608719 systemd[1]: modprobe@fuse.service: Deactivated successfully.
Dec 13 02:03:25.608829 systemd[1]: Finished modprobe@fuse.service.
Dec 13 02:03:25.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.609929 systemd[1]: modprobe@loop.service: Deactivated successfully.
Dec 13 02:03:25.610048 systemd[1]: Finished modprobe@loop.service.
Dec 13 02:03:25.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.611108 systemd[1]: Finished systemd-modules-load.service.
Dec 13 02:03:25.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.612214 systemd[1]: Finished systemd-network-generator.service.
Dec 13 02:03:25.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.613391 systemd[1]: Finished systemd-remount-fs.service.
Dec 13 02:03:25.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.614618 systemd[1]: Reached target network-pre.target.
Dec 13 02:03:25.616493 systemd[1]: Mounting sys-fs-fuse-connections.mount...
Dec 13 02:03:25.618541 systemd[1]: Mounting sys-kernel-config.mount...
Dec 13 02:03:25.619336 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/).
Dec 13 02:03:25.620771 systemd[1]: Starting systemd-hwdb-update.service...
Dec 13 02:03:25.622578 systemd[1]: Starting systemd-journal-flush.service...
Dec 13 02:03:25.623488 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Dec 13 02:03:25.630090 systemd-journald[991]: Time spent on flushing to /var/log/journal/846e1ef1319c408d89c7e02c04dfd5ec is 17.190ms for 1087 entries.
Dec 13 02:03:25.630090 systemd-journald[991]: System Journal (/var/log/journal/846e1ef1319c408d89c7e02c04dfd5ec) is 8.0M, max 195.6M, 187.6M free.
Dec 13 02:03:25.686213 systemd-journald[991]: Received client request to flush runtime journal.
Dec 13 02:03:25.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.624604 systemd[1]: Starting systemd-random-seed.service...
Dec 13 02:03:25.625727 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Dec 13 02:03:25.626697 systemd[1]: Starting systemd-sysctl.service...
Dec 13 02:03:25.628513 systemd[1]: Starting systemd-sysusers.service...
Dec 13 02:03:25.632623 systemd[1]: Mounted sys-fs-fuse-connections.mount.
Dec 13 02:03:25.687051 udevadm[1010]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in.
Dec 13 02:03:25.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:25.634446 systemd[1]: Mounted sys-kernel-config.mount.
Dec 13 02:03:25.641087 systemd[1]: Finished systemd-udev-trigger.service.
Dec 13 02:03:25.643653 systemd[1]: Starting systemd-udev-settle.service...
Dec 13 02:03:25.644975 systemd[1]: Finished systemd-random-seed.service.
Dec 13 02:03:25.646508 systemd[1]: Finished systemd-sysctl.service.
Dec 13 02:03:25.647581 systemd[1]: Reached target first-boot-complete.target.
Dec 13 02:03:25.652239 systemd[1]: Finished systemd-sysusers.service.
Dec 13 02:03:25.687102 systemd[1]: Finished systemd-journal-flush.service.
Dec 13 02:03:26.062395 systemd[1]: Finished systemd-hwdb-update.service.
Dec 13 02:03:26.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.063000 audit: BPF prog-id=24 op=LOAD
Dec 13 02:03:26.063000 audit: BPF prog-id=25 op=LOAD
Dec 13 02:03:26.063000 audit: BPF prog-id=7 op=UNLOAD
Dec 13 02:03:26.063000 audit: BPF prog-id=8 op=UNLOAD
Dec 13 02:03:26.064573 systemd[1]: Starting systemd-udevd.service...
Dec 13 02:03:26.081664 systemd-udevd[1012]: Using default interface naming scheme 'v252'.
Dec 13 02:03:26.094442 systemd[1]: Started systemd-udevd.service.
Dec 13 02:03:26.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.098000 audit: BPF prog-id=26 op=LOAD
Dec 13 02:03:26.100076 systemd[1]: Starting systemd-networkd.service...
Dec 13 02:03:26.104000 audit: BPF prog-id=27 op=LOAD
Dec 13 02:03:26.104000 audit: BPF prog-id=28 op=LOAD
Dec 13 02:03:26.104000 audit: BPF prog-id=29 op=LOAD
Dec 13 02:03:26.106033 systemd[1]: Starting systemd-userdbd.service...
Dec 13 02:03:26.118051 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped.
Dec 13 02:03:26.141402 systemd[1]: Started systemd-userdbd.service.
Dec 13 02:03:26.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.156936 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2
Dec 13 02:03:26.172950 kernel: ACPI: button: Power Button [PWRF]
Dec 13 02:03:26.178282 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Dec 13 02:03:26.199937 systemd-networkd[1026]: lo: Link UP
Dec 13 02:03:26.199949 systemd-networkd[1026]: lo: Gained carrier
Dec 13 02:03:26.200407 systemd-networkd[1026]: Enumeration completed
Dec 13 02:03:26.200503 systemd[1]: Started systemd-networkd.service.
Dec 13 02:03:26.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.202036 systemd-networkd[1026]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Dec 13 02:03:26.203253 systemd-networkd[1026]: eth0: Link UP
Dec 13 02:03:26.203264 systemd-networkd[1026]: eth0: Gained carrier
Dec 13 02:03:26.218029 systemd-networkd[1026]: eth0: DHCPv4 address 10.0.0.101/16, gateway 10.0.0.1 acquired from 10.0.0.1
Dec 13 02:03:26.185000 audit[1036]: AVC avc:  denied  { confidentiality } for  pid=1036 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1
Dec 13 02:03:26.185000 audit[1036]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563b95cf3b90 a1=337fc a2=7fbcadb2dbc5 a3=5 items=110 ppid=1012 pid=1036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:26.185000 audit: CWD cwd="/"
Dec 13 02:03:26.185000 audit: PATH item=0 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=1 name=(null) inode=14336 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=2 name=(null) inode=14336 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=3 name=(null) inode=16385 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=4 name=(null) inode=14336 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=5 name=(null) inode=16386 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=6 name=(null) inode=14336 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=7 name=(null) inode=16387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=8 name=(null) inode=16387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=9 name=(null) inode=16388 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=10 name=(null) inode=16387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=11 name=(null) inode=16389 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=12 name=(null) inode=16387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=13 name=(null) inode=16390 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=14 name=(null) inode=16387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=15 name=(null) inode=16391 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=16 name=(null) inode=16387 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=17 name=(null) inode=16392 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=18 name=(null) inode=14336 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=19 name=(null) inode=16393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=20 name=(null) inode=16393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=21 name=(null) inode=16394 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=22 name=(null) inode=16393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=23 name=(null) inode=16395 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=24 name=(null) inode=16393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=25 name=(null) inode=16396 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=26 name=(null) inode=16393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=27 name=(null) inode=16397 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=28 name=(null) inode=16393 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=29 name=(null) inode=16398 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=30 name=(null) inode=14336 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=31 name=(null) inode=16399 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=32 name=(null) inode=16399 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=33 name=(null) inode=16400 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=34 name=(null) inode=16399 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=35 name=(null) inode=16401 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=36 name=(null) inode=16399 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=37 name=(null) inode=16402 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=38 name=(null) inode=16399 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=39 name=(null) inode=16403 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=40 name=(null) inode=16399 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=41 name=(null) inode=16404 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=42 name=(null) inode=14336 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=43 name=(null) inode=16405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=44 name=(null) inode=16405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=45 name=(null) inode=16406 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=46 name=(null) inode=16405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=47 name=(null) inode=16407 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=48 name=(null) inode=16405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=49 name=(null) inode=16408 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=50 name=(null) inode=16405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=51 name=(null) inode=16409 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=52 name=(null) inode=16405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=53 name=(null) inode=16410 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=54 name=(null) inode=44 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=55 name=(null) inode=16411 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=56 name=(null) inode=16411 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=57 name=(null) inode=16412 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=58 name=(null) inode=16411 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=59 name=(null) inode=16413 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=60 name=(null) inode=16411 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=61 name=(null) inode=16414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=62 name=(null) inode=16414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=63 name=(null) inode=16415 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=64 name=(null) inode=16414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=65 name=(null) inode=16416 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=66 name=(null) inode=16414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=67 name=(null) inode=16417 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=68 name=(null) inode=16414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=69 name=(null) inode=16418 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=70 name=(null) inode=16414 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=71 name=(null) inode=16419 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=72 name=(null) inode=16411 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=73 name=(null) inode=16420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=74 name=(null) inode=16420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=75 name=(null) inode=16421 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=76 name=(null) inode=16420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=77 name=(null) inode=16422 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=78 name=(null) inode=16420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=79 name=(null) inode=16423 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=80 name=(null) inode=16420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=81 name=(null) inode=16424 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=82 name=(null) inode=16420 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=83 name=(null) inode=16425 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=84 name=(null) inode=16411 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=85 name=(null) inode=16426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=86 name=(null) inode=16426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=87 name=(null) inode=16427 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=88 name=(null) inode=16426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=89 name=(null) inode=16428 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=90 name=(null) inode=16426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=91 name=(null) inode=16429 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=92 name=(null) inode=16426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=93 name=(null) inode=16430 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=94 name=(null) inode=16426 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=95 name=(null) inode=16431 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=96 name=(null) inode=16411 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=97 name=(null) inode=16432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=98 name=(null) inode=16432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=99 name=(null) inode=16433 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=100 name=(null) inode=16432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=101 name=(null) inode=16434 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=102 name=(null) inode=16432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=103 name=(null) inode=16435 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=104 name=(null) inode=16432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=105 name=(null) inode=16436 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=106 name=(null) inode=16432 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=107 name=(null) inode=16437 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PATH item=109 name=(null) inode=16438 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:03:26.185000 audit: PROCTITLE proctitle="(udev-worker)"
Dec 13 02:03:26.236932 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt
Dec 13 02:03:26.237148 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI)
Dec 13 02:03:26.237282 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD
Dec 13 02:03:26.242929 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3
Dec 13 02:03:26.252007 kernel: mousedev: PS/2 mouse device common for all mice
Dec 13 02:03:26.276044 kernel: kvm: Nested Virtualization enabled
Dec 13 02:03:26.276145 kernel: SVM: kvm: Nested Paging enabled
Dec 13 02:03:26.276179 kernel: SVM: Virtual VMLOAD VMSAVE supported
Dec 13 02:03:26.276208 kernel: SVM: Virtual GIF supported
Dec 13 02:03:26.299942 kernel: EDAC MC: Ver: 3.0.0
Dec 13 02:03:26.329227 systemd[1]: Finished systemd-udev-settle.service.
Dec 13 02:03:26.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.331132 systemd[1]: Starting lvm2-activation-early.service...
Dec 13 02:03:26.338684 lvm[1048]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Dec 13 02:03:26.363497 systemd[1]: Finished lvm2-activation-early.service.
Dec 13 02:03:26.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.364501 systemd[1]: Reached target cryptsetup.target.
Dec 13 02:03:26.366199 systemd[1]: Starting lvm2-activation.service...
Dec 13 02:03:26.369137 lvm[1049]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Dec 13 02:03:26.392454 systemd[1]: Finished lvm2-activation.service.
Dec 13 02:03:26.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.393400 systemd[1]: Reached target local-fs-pre.target.
Dec 13 02:03:26.394308 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw).
Dec 13 02:03:26.394333 systemd[1]: Reached target local-fs.target.
Dec 13 02:03:26.395217 systemd[1]: Reached target machines.target.
Dec 13 02:03:26.396942 systemd[1]: Starting ldconfig.service...
Dec 13 02:03:26.397945 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Dec 13 02:03:26.397980 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 02:03:26.398811 systemd[1]: Starting systemd-boot-update.service...
Dec 13 02:03:26.400636 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service...
Dec 13 02:03:26.402675 systemd[1]: Starting systemd-machine-id-commit.service...
Dec 13 02:03:26.404787 systemd[1]: Starting systemd-sysext.service...
Dec 13 02:03:26.405989 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1051 (bootctl)
Dec 13 02:03:26.407177 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service...
Dec 13 02:03:26.414462 systemd[1]: Unmounting usr-share-oem.mount...
Dec 13 02:03:26.415251 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service.
Dec 13 02:03:26.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.417638 systemd[1]: usr-share-oem.mount: Deactivated successfully.
Dec 13 02:03:26.417865 systemd[1]: Unmounted usr-share-oem.mount.
Dec 13 02:03:26.427939 kernel: loop0: detected capacity change from 0 to 210664
Dec 13 02:03:26.444982 systemd-fsck[1060]: fsck.fat 4.2 (2021-01-31)
Dec 13 02:03:26.444982 systemd-fsck[1060]: /dev/vda1: 789 files, 119291/258078 clusters
Dec 13 02:03:26.446899 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service.
Dec 13 02:03:26.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.450046 systemd[1]: Mounting boot.mount...
Dec 13 02:03:26.457773 systemd[1]: Mounted boot.mount.
Dec 13 02:03:26.591933 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher
Dec 13 02:03:26.594983 systemd[1]: etc-machine\x2did.mount: Deactivated successfully.
Dec 13 02:03:26.595627 systemd[1]: Finished systemd-boot-update.service.
Dec 13 02:03:26.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.597030 systemd[1]: Finished systemd-machine-id-commit.service.
Dec 13 02:03:26.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.605936 kernel: loop1: detected capacity change from 0 to 210664
Dec 13 02:03:26.609998 (sd-sysext)[1064]: Using extensions 'kubernetes'.
Dec 13 02:03:26.610321 (sd-sysext)[1064]: Merged extensions into '/usr'.
Dec 13 02:03:26.624991 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:03:26.626420 systemd[1]: Mounting usr-share-oem.mount...
Dec 13 02:03:26.627406 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Dec 13 02:03:26.628406 systemd[1]: Starting modprobe@dm_mod.service...
Dec 13 02:03:26.630153 systemd[1]: Starting modprobe@efi_pstore.service...
Dec 13 02:03:26.631831 systemd[1]: Starting modprobe@loop.service...
Dec 13 02:03:26.632657 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Dec 13 02:03:26.632749 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 02:03:26.632835 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:03:26.635046 systemd[1]: Mounted usr-share-oem.mount.
Dec 13 02:03:26.636238 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Dec 13 02:03:26.636338 systemd[1]: Finished modprobe@dm_mod.service.
Dec 13 02:03:26.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.637586 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Dec 13 02:03:26.637679 systemd[1]: Finished modprobe@efi_pstore.service.
Dec 13 02:03:26.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.639013 systemd[1]: modprobe@loop.service: Deactivated successfully.
Dec 13 02:03:26.639104 systemd[1]: Finished modprobe@loop.service.
Dec 13 02:03:26.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.640365 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Dec 13 02:03:26.640450 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Dec 13 02:03:26.641233 systemd[1]: Finished systemd-sysext.service.
Dec 13 02:03:26.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.643132 systemd[1]: Starting ensure-sysext.service...
Dec 13 02:03:26.644892 systemd[1]: Starting systemd-tmpfiles-setup.service...
Dec 13 02:03:26.649176 systemd[1]: Reloading.
Dec 13 02:03:26.650013 ldconfig[1050]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start.
Dec 13 02:03:26.657831 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring.
Dec 13 02:03:26.659790 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring.
Dec 13 02:03:26.662504 systemd-tmpfiles[1071]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring.
Dec 13 02:03:26.697520 /usr/lib/systemd/system-generators/torcx-generator[1090]: time="2024-12-13T02:03:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]"
Dec 13 02:03:26.697886 /usr/lib/systemd/system-generators/torcx-generator[1090]: time="2024-12-13T02:03:26Z" level=info msg="torcx already run"
Dec 13 02:03:26.762286 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Dec 13 02:03:26.762301 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Dec 13 02:03:26.778740 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Dec 13 02:03:26.829000 audit: BPF prog-id=30 op=LOAD
Dec 13 02:03:26.829000 audit: BPF prog-id=31 op=LOAD
Dec 13 02:03:26.829000 audit: BPF prog-id=24 op=UNLOAD
Dec 13 02:03:26.829000 audit: BPF prog-id=25 op=UNLOAD
Dec 13 02:03:26.829000 audit: BPF prog-id=32 op=LOAD
Dec 13 02:03:26.829000 audit: BPF prog-id=27 op=UNLOAD
Dec 13 02:03:26.829000 audit: BPF prog-id=33 op=LOAD
Dec 13 02:03:26.829000 audit: BPF prog-id=34 op=LOAD
Dec 13 02:03:26.829000 audit: BPF prog-id=28 op=UNLOAD
Dec 13 02:03:26.829000 audit: BPF prog-id=29 op=UNLOAD
Dec 13 02:03:26.831000 audit: BPF prog-id=35 op=LOAD
Dec 13 02:03:26.831000 audit: BPF prog-id=26 op=UNLOAD
Dec 13 02:03:26.832000 audit: BPF prog-id=36 op=LOAD
Dec 13 02:03:26.832000 audit: BPF prog-id=21 op=UNLOAD
Dec 13 02:03:26.832000 audit: BPF prog-id=37 op=LOAD
Dec 13 02:03:26.832000 audit: BPF prog-id=38 op=LOAD
Dec 13 02:03:26.832000 audit: BPF prog-id=22 op=UNLOAD
Dec 13 02:03:26.832000 audit: BPF prog-id=23 op=UNLOAD
Dec 13 02:03:26.835847 systemd[1]: Finished ldconfig.service.
Dec 13 02:03:26.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.837620 systemd[1]: Finished systemd-tmpfiles-setup.service.
Dec 13 02:03:26.841030 systemd[1]: Starting audit-rules.service...
Dec 13 02:03:26.842502 systemd[1]: Starting clean-ca-certificates.service...
Dec 13 02:03:26.844357 systemd[1]: Starting systemd-journal-catalog-update.service...
Dec 13 02:03:26.845000 audit: BPF prog-id=39 op=LOAD
Dec 13 02:03:26.846685 systemd[1]: Starting systemd-resolved.service...
Dec 13 02:03:26.847000 audit: BPF prog-id=40 op=LOAD
Dec 13 02:03:26.848803 systemd[1]: Starting systemd-timesyncd.service...
Dec 13 02:03:26.850871 systemd[1]: Starting systemd-update-utmp.service...
Dec 13 02:03:26.852289 systemd[1]: Finished clean-ca-certificates.service.
Dec 13 02:03:26.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.854000 audit[1144]: SYSTEM_BOOT pid=1144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.855198 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Dec 13 02:03:26.858081 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:03:26.858319 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Dec 13 02:03:26.859593 systemd[1]: Starting modprobe@dm_mod.service...
Dec 13 02:03:26.861310 systemd[1]: Starting modprobe@efi_pstore.service...
Dec 13 02:03:26.863043 systemd[1]: Starting modprobe@loop.service...
Dec 13 02:03:26.863878 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Dec 13 02:03:26.864065 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 02:03:26.864209 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Dec 13 02:03:26.864323 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:03:26.865752 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Dec 13 02:03:26.865939 systemd[1]: Finished modprobe@dm_mod.service.
Dec 13 02:03:26.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.867385 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Dec 13 02:03:26.867799 systemd[1]: Finished modprobe@efi_pstore.service.
Dec 13 02:03:26.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.869350 systemd[1]: Finished systemd-journal-catalog-update.service.
Dec 13 02:03:26.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.870854 systemd[1]: modprobe@loop.service: Deactivated successfully.
Dec 13 02:03:26.874136 systemd[1]: Finished modprobe@loop.service.
Dec 13 02:03:26.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:26.876289 systemd[1]: Finished systemd-update-utmp.service.
Dec 13 02:03:26.877228 augenrules[1156]: No rules
Dec 13 02:03:26.876000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1
Dec 13 02:03:26.876000 audit[1156]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe79963ac0 a2=420 a3=0 items=0 ppid=1133 pid=1156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:26.876000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573
Dec 13 02:03:26.878330 systemd[1]: Finished audit-rules.service.
Dec 13 02:03:26.880351 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:03:26.880525 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Dec 13 02:03:26.881525 systemd[1]: Starting modprobe@dm_mod.service...
Dec 13 02:03:26.883254 systemd[1]: Starting modprobe@efi_pstore.service...
Dec 13 02:03:26.885075 systemd[1]: Starting modprobe@loop.service...
Dec 13 02:03:26.885801 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Dec 13 02:03:26.885889 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 02:03:26.886999 systemd[1]: Starting systemd-update-done.service...
Dec 13 02:03:26.887811 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Dec 13 02:03:26.887890 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:03:26.888714 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Dec 13 02:03:26.888811 systemd[1]: Finished modprobe@dm_mod.service.
Dec 13 02:03:26.889963 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Dec 13 02:03:26.890060 systemd[1]: Finished modprobe@efi_pstore.service.
Dec 13 02:03:26.891205 systemd[1]: modprobe@loop.service: Deactivated successfully.
Dec 13 02:03:26.891295 systemd[1]: Finished modprobe@loop.service.
Dec 13 02:03:26.892393 systemd[1]: Finished systemd-update-done.service.
Dec 13 02:03:26.895649 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:03:26.895900 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Dec 13 02:03:26.897279 systemd[1]: Starting modprobe@dm_mod.service...
Dec 13 02:03:26.898880 systemd[1]: Starting modprobe@drm.service...
Dec 13 02:03:26.900532 systemd[1]: Starting modprobe@efi_pstore.service...
Dec 13 02:03:26.902222 systemd[1]: Starting modprobe@loop.service...
Dec 13 02:03:26.903113 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Dec 13 02:03:26.903255 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 02:03:26.904457 systemd[1]: Starting systemd-networkd-wait-online.service...
Dec 13 02:03:26.905459 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Dec 13 02:03:26.905551 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Dec 13 02:03:26.906513 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Dec 13 02:03:26.906626 systemd[1]: Finished modprobe@dm_mod.service.
Dec 13 02:03:26.907888 systemd[1]: modprobe@drm.service: Deactivated successfully.
Dec 13 02:03:26.908038 systemd[1]: Finished modprobe@drm.service.
Dec 13 02:03:26.909303 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Dec 13 02:03:26.909428 systemd[1]: Finished modprobe@efi_pstore.service.
Dec 13 02:03:26.910689 systemd-resolved[1137]: Positive Trust Anchors:
Dec 13 02:03:26.910779 systemd[1]: modprobe@loop.service: Deactivated successfully.
Dec 13 02:03:26.910923 systemd[1]: Finished modprobe@loop.service.
Dec 13 02:03:26.911082 systemd-resolved[1137]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Dec 13 02:03:26.911190 systemd-resolved[1137]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Dec 13 02:03:26.912430 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Dec 13 02:03:26.912516 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Dec 13 02:03:26.913485 systemd[1]: Finished ensure-sysext.service.
Dec 13 02:03:26.918396 systemd-resolved[1137]: Defaulting to hostname 'linux'.
Dec 13 02:03:26.919662 systemd[1]: Started systemd-resolved.service.
Dec 13 02:03:26.920620 systemd[1]: Reached target network.target.
Dec 13 02:03:26.921440 systemd[1]: Reached target nss-lookup.target.
Dec 13 02:03:26.922444 systemd[1]: Started systemd-timesyncd.service.
Dec 13 02:03:26.923444 systemd[1]: Reached target sysinit.target.
Dec 13 02:03:28.380402 systemd-resolved[1137]: Clock change detected. Flushing caches.
Dec 13 02:03:28.380437 systemd-timesyncd[1138]: Contacted time server 10.0.0.1:123 (10.0.0.1).
Dec 13 02:03:28.380474 systemd-timesyncd[1138]: Initial clock synchronization to Fri 2024-12-13 02:03:28.380372 UTC.
Dec 13 02:03:28.381254 systemd[1]: Started motdgen.path.
Dec 13 02:03:28.382011 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path.
Dec 13 02:03:28.383158 systemd[1]: Started systemd-tmpfiles-clean.timer.
Dec 13 02:03:28.384114 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate).
Dec 13 02:03:28.384139 systemd[1]: Reached target paths.target.
Dec 13 02:03:28.384935 systemd[1]: Reached target time-set.target.
Dec 13 02:03:28.385907 systemd[1]: Started logrotate.timer.
Dec 13 02:03:28.386724 systemd[1]: Started mdadm.timer.
Dec 13 02:03:28.387458 systemd[1]: Reached target timers.target.
Dec 13 02:03:28.388536 systemd[1]: Listening on dbus.socket.
Dec 13 02:03:28.390177 systemd[1]: Starting docker.socket...
Dec 13 02:03:28.392769 systemd[1]: Listening on sshd.socket.
Dec 13 02:03:28.393633 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 02:03:28.394022 systemd[1]: Listening on docker.socket.
Dec 13 02:03:28.394967 systemd[1]: Reached target sockets.target.
Dec 13 02:03:28.395785 systemd[1]: Reached target basic.target.
Dec 13 02:03:28.396613 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met.
Dec 13 02:03:28.396637 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met.
Dec 13 02:03:28.397446 systemd[1]: Starting containerd.service...
Dec 13 02:03:28.399044 systemd[1]: Starting dbus.service...
Dec 13 02:03:28.400484 systemd[1]: Starting enable-oem-cloudinit.service...
Dec 13 02:03:28.402278 systemd[1]: Starting extend-filesystems.service...
Dec 13 02:03:28.403190 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment).
Dec 13 02:03:28.404049 systemd[1]: Starting motdgen.service...
Dec 13 02:03:28.404541 jq[1176]: false
Dec 13 02:03:28.405567 systemd[1]: Starting ssh-key-proc-cmdline.service...
Dec 13 02:03:28.407373 systemd[1]: Starting sshd-keygen.service...
Dec 13 02:03:28.410919 systemd[1]: Starting systemd-logind.service...
Dec 13 02:03:28.411742 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 02:03:28.411808 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0).
Dec 13 02:03:28.412323 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details.
Dec 13 02:03:28.413027 systemd[1]: Starting update-engine.service...
Dec 13 02:03:28.414461 systemd[1]: Starting update-ssh-keys-after-ignition.service...
Dec 13 02:03:28.415253 extend-filesystems[1177]: Found loop1
Dec 13 02:03:28.416410 extend-filesystems[1177]: Found sr0
Dec 13 02:03:28.416410 extend-filesystems[1177]: Found vda
Dec 13 02:03:28.416410 extend-filesystems[1177]: Found vda1
Dec 13 02:03:28.416410 extend-filesystems[1177]: Found vda2
Dec 13 02:03:28.416410 extend-filesystems[1177]: Found vda3
Dec 13 02:03:28.416410 extend-filesystems[1177]: Found usr
Dec 13 02:03:28.416410 extend-filesystems[1177]: Found vda4
Dec 13 02:03:28.416410 extend-filesystems[1177]: Found vda6
Dec 13 02:03:28.416410 extend-filesystems[1177]: Found vda7
Dec 13 02:03:28.416410 extend-filesystems[1177]: Found vda9
Dec 13 02:03:28.416410 extend-filesystems[1177]: Checking size of /dev/vda9
Dec 13 02:03:28.416607 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'.
Dec 13 02:03:28.424687 dbus-daemon[1175]: [system] SELinux support is enabled
Dec 13 02:03:28.416761 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped.
Dec 13 02:03:28.417179 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully.
Dec 13 02:03:28.433736 jq[1193]: true
Dec 13 02:03:28.417308 systemd[1]: Finished ssh-key-proc-cmdline.service.
Dec 13 02:03:28.424799 systemd[1]: Started dbus.service.
Dec 13 02:03:28.426831 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml).
Dec 13 02:03:28.426846 systemd[1]: Reached target system-config.target.
Dec 13 02:03:28.429150 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url).
Dec 13 02:03:28.429164 systemd[1]: Reached target user-config.target.
Dec 13 02:03:28.434249 systemd[1]: motdgen.service: Deactivated successfully.
Dec 13 02:03:28.434396 systemd[1]: Finished motdgen.service.
Dec 13 02:03:28.435180 jq[1203]: true
Dec 13 02:03:28.448283 update_engine[1191]: I1213 02:03:28.448166  1191 main.cc:92] Flatcar Update Engine starting
Dec 13 02:03:28.449935 systemd[1]: Started update-engine.service.
Dec 13 02:03:28.450094 update_engine[1191]: I1213 02:03:28.450079  1191 update_check_scheduler.cc:74] Next update check in 2m16s
Dec 13 02:03:28.452166 systemd[1]: Started locksmithd.service.
Dec 13 02:03:28.458725 extend-filesystems[1177]: Resized partition /dev/vda9
Dec 13 02:03:28.459843 extend-filesystems[1223]: resize2fs 1.46.5 (30-Dec-2021)
Dec 13 02:03:28.463795 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks
Dec 13 02:03:28.473380 systemd-logind[1189]: Watching system buttons on /dev/input/event1 (Power Button)
Dec 13 02:03:28.473405 systemd-logind[1189]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard)
Dec 13 02:03:28.473774 systemd-logind[1189]: New seat seat0.
Dec 13 02:03:28.477513 systemd[1]: Started systemd-logind.service.
Dec 13 02:03:28.488838 env[1196]: time="2024-12-13T02:03:28.485263827Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16
Dec 13 02:03:28.491779 kernel: EXT4-fs (vda9): resized filesystem to 1864699
Dec 13 02:03:28.501288 env[1196]: time="2024-12-13T02:03:28.501246020Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1
Dec 13 02:03:28.514164 env[1196]: time="2024-12-13T02:03:28.514120694Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1
Dec 13 02:03:28.514293 extend-filesystems[1223]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required
Dec 13 02:03:28.514293 extend-filesystems[1223]: old_desc_blocks = 1, new_desc_blocks = 1
Dec 13 02:03:28.514293 extend-filesystems[1223]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long.
Dec 13 02:03:28.519404 extend-filesystems[1177]: Resized filesystem in /dev/vda9
Dec 13 02:03:28.514901 systemd[1]: extend-filesystems.service: Deactivated successfully.
Dec 13 02:03:28.515063 systemd[1]: Finished extend-filesystems.service.
Dec 13 02:03:28.520678 bash[1224]: Updated "/home/core/.ssh/authorized_keys"
Dec 13 02:03:28.521166 systemd[1]: Finished update-ssh-keys-after-ignition.service.
Dec 13 02:03:28.522006 env[1196]: time="2024-12-13T02:03:28.521954345Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1
Dec 13 02:03:28.522006 env[1196]: time="2024-12-13T02:03:28.521993549Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1
Dec 13 02:03:28.522579 env[1196]: time="2024-12-13T02:03:28.522500199Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Dec 13 02:03:28.522579 env[1196]: time="2024-12-13T02:03:28.522522200Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1
Dec 13 02:03:28.522579 env[1196]: time="2024-12-13T02:03:28.522535956Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured"
Dec 13 02:03:28.522579 env[1196]: time="2024-12-13T02:03:28.522545133Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1
Dec 13 02:03:28.522681 env[1196]: time="2024-12-13T02:03:28.522623430Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1
Dec 13 02:03:28.522876 env[1196]: time="2024-12-13T02:03:28.522848372Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1
Dec 13 02:03:28.522987 env[1196]: time="2024-12-13T02:03:28.522966092Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Dec 13 02:03:28.522987 env[1196]: time="2024-12-13T02:03:28.522983345Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1
Dec 13 02:03:28.523051 env[1196]: time="2024-12-13T02:03:28.523040412Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured"
Dec 13 02:03:28.523083 env[1196]: time="2024-12-13T02:03:28.523051623Z" level=info msg="metadata content store policy set" policy=shared
Dec 13 02:03:28.525036 locksmithd[1212]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot"
Dec 13 02:03:28.529070 env[1196]: time="2024-12-13T02:03:28.528221057Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1
Dec 13 02:03:28.529070 env[1196]: time="2024-12-13T02:03:28.528256855Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1
Dec 13 02:03:28.529070 env[1196]: time="2024-12-13T02:03:28.528269268Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1
Dec 13 02:03:28.529070 env[1196]: time="2024-12-13T02:03:28.528315464Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1
Dec 13 02:03:28.529070 env[1196]: time="2024-12-13T02:03:28.528335221Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1
Dec 13 02:03:28.529070 env[1196]: time="2024-12-13T02:03:28.528397158Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1
Dec 13 02:03:28.529070 env[1196]: time="2024-12-13T02:03:28.528412557Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1
Dec 13 02:03:28.529070 env[1196]: time="2024-12-13T02:03:28.528425671Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1
Dec 13 02:03:28.529070 env[1196]: time="2024-12-13T02:03:28.528438144Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1
Dec 13 02:03:28.529070 env[1196]: time="2024-12-13T02:03:28.528451129Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1
Dec 13 02:03:28.529070 env[1196]: time="2024-12-13T02:03:28.528462610Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1
Dec 13 02:03:28.529070 env[1196]: time="2024-12-13T02:03:28.528474553Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1
Dec 13 02:03:28.529070 env[1196]: time="2024-12-13T02:03:28.528559352Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2
Dec 13 02:03:28.529070 env[1196]: time="2024-12-13T02:03:28.528622200Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1
Dec 13 02:03:28.529341 env[1196]: time="2024-12-13T02:03:28.528907395Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1
Dec 13 02:03:28.529341 env[1196]: time="2024-12-13T02:03:28.528930848Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1
Dec 13 02:03:28.529341 env[1196]: time="2024-12-13T02:03:28.528953561Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1
Dec 13 02:03:28.529341 env[1196]: time="2024-12-13T02:03:28.528996952Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1
Dec 13 02:03:28.529341 env[1196]: time="2024-12-13T02:03:28.529017631Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1
Dec 13 02:03:28.529341 env[1196]: time="2024-12-13T02:03:28.529039552Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1
Dec 13 02:03:28.530933 env[1196]: time="2024-12-13T02:03:28.529558876Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1
Dec 13 02:03:28.530933 env[1196]: time="2024-12-13T02:03:28.529595675Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1
Dec 13 02:03:28.530933 env[1196]: time="2024-12-13T02:03:28.529620291Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1
Dec 13 02:03:28.530933 env[1196]: time="2024-12-13T02:03:28.529639678Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1
Dec 13 02:03:28.530933 env[1196]: time="2024-12-13T02:03:28.529656299Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1
Dec 13 02:03:28.530933 env[1196]: time="2024-12-13T02:03:28.529674072Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1
Dec 13 02:03:28.530933 env[1196]: time="2024-12-13T02:03:28.529813584Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1
Dec 13 02:03:28.530933 env[1196]: time="2024-12-13T02:03:28.529840304Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1
Dec 13 02:03:28.530933 env[1196]: time="2024-12-13T02:03:28.529856775Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1
Dec 13 02:03:28.530933 env[1196]: time="2024-12-13T02:03:28.529872264Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1
Dec 13 02:03:28.530933 env[1196]: time="2024-12-13T02:03:28.529896349Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1
Dec 13 02:03:28.530933 env[1196]: time="2024-12-13T02:03:28.529910235Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1
Dec 13 02:03:28.530933 env[1196]: time="2024-12-13T02:03:28.529959558Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin"
Dec 13 02:03:28.530933 env[1196]: time="2024-12-13T02:03:28.529998240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1
Dec 13 02:03:28.531250 env[1196]: time="2024-12-13T02:03:28.530220968Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}"
Dec 13 02:03:28.531250 env[1196]: time="2024-12-13T02:03:28.530276191Z" level=info msg="Connect containerd service"
Dec 13 02:03:28.531250 env[1196]: time="2024-12-13T02:03:28.530316186Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\""
Dec 13 02:03:28.531862 env[1196]: time="2024-12-13T02:03:28.531359543Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Dec 13 02:03:28.532046 env[1196]: time="2024-12-13T02:03:28.532009532Z" level=info msg="Start subscribing containerd event"
Dec 13 02:03:28.532135 env[1196]: time="2024-12-13T02:03:28.532117174Z" level=info msg="Start recovering state"
Dec 13 02:03:28.532243 env[1196]: time="2024-12-13T02:03:28.532211902Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc
Dec 13 02:03:28.532285 env[1196]: time="2024-12-13T02:03:28.532258549Z" level=info msg=serving... address=/run/containerd/containerd.sock
Dec 13 02:03:28.532346 env[1196]: time="2024-12-13T02:03:28.532328019Z" level=info msg="Start event monitor"
Dec 13 02:03:28.532344 systemd[1]: Started containerd.service.
Dec 13 02:03:28.532464 env[1196]: time="2024-12-13T02:03:28.532447313Z" level=info msg="Start snapshots syncer"
Dec 13 02:03:28.532533 env[1196]: time="2024-12-13T02:03:28.532516112Z" level=info msg="Start cni network conf syncer for default"
Dec 13 02:03:28.532602 env[1196]: time="2024-12-13T02:03:28.532584701Z" level=info msg="Start streaming server"
Dec 13 02:03:28.532792 env[1196]: time="2024-12-13T02:03:28.532768125Z" level=info msg="containerd successfully booted in 0.048968s"
Dec 13 02:03:28.753982 systemd-networkd[1026]: eth0: Gained IPv6LL
Dec 13 02:03:28.755671 systemd[1]: Finished systemd-networkd-wait-online.service.
Dec 13 02:03:28.757093 systemd[1]: Reached target network-online.target.
Dec 13 02:03:28.759885 systemd[1]: Starting kubelet.service...
Dec 13 02:03:28.839137 sshd_keygen[1197]: ssh-keygen: generating new host keys: RSA ECDSA ED25519
Dec 13 02:03:28.857979 systemd[1]: Finished sshd-keygen.service.
Dec 13 02:03:28.860554 systemd[1]: Starting issuegen.service...
Dec 13 02:03:28.865654 systemd[1]: issuegen.service: Deactivated successfully.
Dec 13 02:03:28.865843 systemd[1]: Finished issuegen.service.
Dec 13 02:03:28.868368 systemd[1]: Starting systemd-user-sessions.service...
Dec 13 02:03:28.874085 systemd[1]: Finished systemd-user-sessions.service.
Dec 13 02:03:28.876488 systemd[1]: Started getty@tty1.service.
Dec 13 02:03:28.878351 systemd[1]: Started serial-getty@ttyS0.service.
Dec 13 02:03:28.879490 systemd[1]: Reached target getty.target.
Dec 13 02:03:29.327487 systemd[1]: Started kubelet.service.
Dec 13 02:03:29.328657 systemd[1]: Reached target multi-user.target.
Dec 13 02:03:29.330474 systemd[1]: Starting systemd-update-utmp-runlevel.service...
Dec 13 02:03:29.337034 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully.
Dec 13 02:03:29.337155 systemd[1]: Finished systemd-update-utmp-runlevel.service.
Dec 13 02:03:29.338293 systemd[1]: Startup finished in 636ms (kernel) + 4.147s (initrd) + 5.018s (userspace) = 9.802s.
Dec 13 02:03:29.753298 kubelet[1253]: E1213 02:03:29.753188    1253 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory"
Dec 13 02:03:29.754885 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Dec 13 02:03:29.755012 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Dec 13 02:03:37.988382 systemd[1]: Created slice system-sshd.slice.
Dec 13 02:03:37.989287 systemd[1]: Started sshd@0-10.0.0.101:22-10.0.0.1:35398.service.
Dec 13 02:03:38.028325 sshd[1263]: Accepted publickey for core from 10.0.0.1 port 35398 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M
Dec 13 02:03:38.029982 sshd[1263]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:03:38.037842 systemd[1]: Created slice user-500.slice.
Dec 13 02:03:38.038894 systemd[1]: Starting user-runtime-dir@500.service...
Dec 13 02:03:38.040430 systemd-logind[1189]: New session 1 of user core.
Dec 13 02:03:38.046816 systemd[1]: Finished user-runtime-dir@500.service.
Dec 13 02:03:38.048028 systemd[1]: Starting user@500.service...
Dec 13 02:03:38.050327 (systemd)[1266]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:03:38.117469 systemd[1266]: Queued start job for default target default.target.
Dec 13 02:03:38.117946 systemd[1266]: Reached target paths.target.
Dec 13 02:03:38.117973 systemd[1266]: Reached target sockets.target.
Dec 13 02:03:38.117990 systemd[1266]: Reached target timers.target.
Dec 13 02:03:38.118003 systemd[1266]: Reached target basic.target.
Dec 13 02:03:38.118043 systemd[1266]: Reached target default.target.
Dec 13 02:03:38.118073 systemd[1266]: Startup finished in 62ms.
Dec 13 02:03:38.118135 systemd[1]: Started user@500.service.
Dec 13 02:03:38.119014 systemd[1]: Started session-1.scope.
Dec 13 02:03:38.170708 systemd[1]: Started sshd@1-10.0.0.101:22-10.0.0.1:35410.service.
Dec 13 02:03:38.206980 sshd[1275]: Accepted publickey for core from 10.0.0.1 port 35410 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M
Dec 13 02:03:38.208110 sshd[1275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:03:38.211531 systemd-logind[1189]: New session 2 of user core.
Dec 13 02:03:38.212458 systemd[1]: Started session-2.scope.
Dec 13 02:03:38.266583 sshd[1275]: pam_unix(sshd:session): session closed for user core
Dec 13 02:03:38.268973 systemd[1]: sshd@1-10.0.0.101:22-10.0.0.1:35410.service: Deactivated successfully.
Dec 13 02:03:38.269475 systemd[1]: session-2.scope: Deactivated successfully.
Dec 13 02:03:38.269943 systemd-logind[1189]: Session 2 logged out. Waiting for processes to exit.
Dec 13 02:03:38.270726 systemd[1]: Started sshd@2-10.0.0.101:22-10.0.0.1:35416.service.
Dec 13 02:03:38.271450 systemd-logind[1189]: Removed session 2.
Dec 13 02:03:38.305987 sshd[1281]: Accepted publickey for core from 10.0.0.1 port 35416 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M
Dec 13 02:03:38.306872 sshd[1281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:03:38.309954 systemd-logind[1189]: New session 3 of user core.
Dec 13 02:03:38.310644 systemd[1]: Started session-3.scope.
Dec 13 02:03:38.360224 sshd[1281]: pam_unix(sshd:session): session closed for user core
Dec 13 02:03:38.363077 systemd[1]: sshd@2-10.0.0.101:22-10.0.0.1:35416.service: Deactivated successfully.
Dec 13 02:03:38.363601 systemd[1]: session-3.scope: Deactivated successfully.
Dec 13 02:03:38.364104 systemd-logind[1189]: Session 3 logged out. Waiting for processes to exit.
Dec 13 02:03:38.365204 systemd[1]: Started sshd@3-10.0.0.101:22-10.0.0.1:35426.service.
Dec 13 02:03:38.365911 systemd-logind[1189]: Removed session 3.
Dec 13 02:03:38.400715 sshd[1287]: Accepted publickey for core from 10.0.0.1 port 35426 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M
Dec 13 02:03:38.401842 sshd[1287]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:03:38.404743 systemd-logind[1189]: New session 4 of user core.
Dec 13 02:03:38.405560 systemd[1]: Started session-4.scope.
Dec 13 02:03:38.457765 sshd[1287]: pam_unix(sshd:session): session closed for user core
Dec 13 02:03:38.460562 systemd[1]: sshd@3-10.0.0.101:22-10.0.0.1:35426.service: Deactivated successfully.
Dec 13 02:03:38.461118 systemd[1]: session-4.scope: Deactivated successfully.
Dec 13 02:03:38.461573 systemd-logind[1189]: Session 4 logged out. Waiting for processes to exit.
Dec 13 02:03:38.462457 systemd[1]: Started sshd@4-10.0.0.101:22-10.0.0.1:35430.service.
Dec 13 02:03:38.463051 systemd-logind[1189]: Removed session 4.
Dec 13 02:03:38.498427 sshd[1293]: Accepted publickey for core from 10.0.0.1 port 35430 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M
Dec 13 02:03:38.499532 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:03:38.503314 systemd-logind[1189]: New session 5 of user core.
Dec 13 02:03:38.504046 systemd[1]: Started session-5.scope.
Dec 13 02:03:38.558332 sudo[1296]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1
Dec 13 02:03:38.558510 sudo[1296]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Dec 13 02:03:38.565969 dbus-daemon[1175]: \xd0\xfd\xda\xf2wU:  received setenforce notice (enforcing=381474080)
Dec 13 02:03:38.567941 sudo[1296]: pam_unix(sudo:session): session closed for user root
Dec 13 02:03:38.569813 sshd[1293]: pam_unix(sshd:session): session closed for user core
Dec 13 02:03:38.572459 systemd[1]: sshd@4-10.0.0.101:22-10.0.0.1:35430.service: Deactivated successfully.
Dec 13 02:03:38.572961 systemd[1]: session-5.scope: Deactivated successfully.
Dec 13 02:03:38.573496 systemd-logind[1189]: Session 5 logged out. Waiting for processes to exit.
Dec 13 02:03:38.574408 systemd[1]: Started sshd@5-10.0.0.101:22-10.0.0.1:35440.service.
Dec 13 02:03:38.575180 systemd-logind[1189]: Removed session 5.
Dec 13 02:03:38.609946 sshd[1300]: Accepted publickey for core from 10.0.0.1 port 35440 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M
Dec 13 02:03:38.611120 sshd[1300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:03:38.614745 systemd-logind[1189]: New session 6 of user core.
Dec 13 02:03:38.615470 systemd[1]: Started session-6.scope.
Dec 13 02:03:38.667947 sudo[1304]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules
Dec 13 02:03:38.668130 sudo[1304]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Dec 13 02:03:38.670382 sudo[1304]: pam_unix(sudo:session): session closed for user root
Dec 13 02:03:38.674727 sudo[1303]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules
Dec 13 02:03:38.674979 sudo[1303]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Dec 13 02:03:38.683112 systemd[1]: Stopping audit-rules.service...
Dec 13 02:03:38.683000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Dec 13 02:03:38.685158 kernel: kauditd_printk_skb: 237 callbacks suppressed
Dec 13 02:03:38.685190 kernel: audit: type=1305 audit(1734055418.683:199): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Dec 13 02:03:38.685354 auditctl[1307]: No rules
Dec 13 02:03:38.685838 systemd[1]: audit-rules.service: Deactivated successfully.
Dec 13 02:03:38.686024 systemd[1]: Stopped audit-rules.service.
Dec 13 02:03:38.683000 audit[1307]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc480b9520 a2=420 a3=0 items=0 ppid=1 pid=1307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:38.687373 systemd[1]: Starting audit-rules.service...
Dec 13 02:03:38.692092 kernel: audit: type=1300 audit(1734055418.683:199): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc480b9520 a2=420 a3=0 items=0 ppid=1 pid=1307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:38.693682 kernel: audit: type=1327 audit(1734055418.683:199): proctitle=2F7362696E2F617564697463746C002D44
Dec 13 02:03:38.683000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44
Dec 13 02:03:38.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:38.697773 kernel: audit: type=1131 audit(1734055418.685:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:38.702240 augenrules[1324]: No rules
Dec 13 02:03:38.702851 systemd[1]: Finished audit-rules.service.
Dec 13 02:03:38.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:38.703893 sudo[1303]: pam_unix(sudo:session): session closed for user root
Dec 13 02:03:38.703000 audit[1303]: USER_END pid=1303 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:38.706521 sshd[1300]: pam_unix(sshd:session): session closed for user core
Dec 13 02:03:38.708520 systemd[1]: sshd@5-10.0.0.101:22-10.0.0.1:35440.service: Deactivated successfully.
Dec 13 02:03:38.709292 systemd[1]: session-6.scope: Deactivated successfully.
Dec 13 02:03:38.709879 systemd-logind[1189]: Session 6 logged out. Waiting for processes to exit.
Dec 13 02:03:38.710413 kernel: audit: type=1130 audit(1734055418.702:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:38.710455 kernel: audit: type=1106 audit(1734055418.703:202): pid=1303 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:38.710471 kernel: audit: type=1104 audit(1734055418.703:203): pid=1303 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:38.703000 audit[1303]: CRED_DISP pid=1303 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:38.712716 systemd-logind[1189]: Removed session 6.
Dec 13 02:03:38.713635 systemd[1]: Started sshd@6-10.0.0.101:22-10.0.0.1:35452.service.
Dec 13 02:03:38.706000 audit[1300]: USER_END pid=1300 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 02:03:38.718781 kernel: audit: type=1106 audit(1734055418.706:204): pid=1300 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 02:03:38.718826 kernel: audit: type=1104 audit(1734055418.706:205): pid=1300 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 02:03:38.706000 audit[1300]: CRED_DISP pid=1300 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 02:03:38.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.101:22-10.0.0.1:35440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:38.726420 kernel: audit: type=1131 audit(1734055418.707:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.101:22-10.0.0.1:35440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:38.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.101:22-10.0.0.1:35452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:38.753000 audit[1330]: USER_ACCT pid=1330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 02:03:38.754375 sshd[1330]: Accepted publickey for core from 10.0.0.1 port 35452 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M
Dec 13 02:03:38.754000 audit[1330]: CRED_ACQ pid=1330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 02:03:38.754000 audit[1330]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb55f9e20 a2=3 a3=0 items=0 ppid=1 pid=1330 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:38.754000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 02:03:38.755507 sshd[1330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 02:03:38.758924 systemd-logind[1189]: New session 7 of user core.
Dec 13 02:03:38.759695 systemd[1]: Started session-7.scope.
Dec 13 02:03:38.763000 audit[1330]: USER_START pid=1330 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 02:03:38.764000 audit[1332]: CRED_ACQ pid=1332 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 02:03:38.810000 audit[1333]: USER_ACCT pid=1333 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:38.810000 audit[1333]: CRED_REFR pid=1333 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:38.811547 sudo[1333]:     core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh
Dec 13 02:03:38.811741 sudo[1333]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Dec 13 02:03:38.812000 audit[1333]: USER_START pid=1333 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:38.823479 systemd[1]: Starting coreos-metadata.service...
Dec 13 02:03:38.830132 systemd[1]: coreos-metadata.service: Deactivated successfully.
Dec 13 02:03:38.830282 systemd[1]: Finished coreos-metadata.service.
Dec 13 02:03:38.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:38.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:39.455500 systemd[1]: Stopped kubelet.service.
Dec 13 02:03:39.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:39.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:39.457366 systemd[1]: Starting kubelet.service...
Dec 13 02:03:39.472148 systemd[1]: Reloading.
Dec 13 02:03:39.536905 /usr/lib/systemd/system-generators/torcx-generator[1397]: time="2024-12-13T02:03:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]"
Dec 13 02:03:39.536935 /usr/lib/systemd/system-generators/torcx-generator[1397]: time="2024-12-13T02:03:39Z" level=info msg="torcx already run"
Dec 13 02:03:40.152023 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Dec 13 02:03:40.152038 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Dec 13 02:03:40.169056 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Dec 13 02:03:40.226000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.226000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.226000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.226000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.226000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.226000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.226000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.226000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.226000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.226000 audit: BPF prog-id=46 op=LOAD
Dec 13 02:03:40.226000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.226000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.226000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.226000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.226000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.226000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.226000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.226000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit: BPF prog-id=47 op=LOAD
Dec 13 02:03:40.227000 audit: BPF prog-id=30 op=UNLOAD
Dec 13 02:03:40.227000 audit: BPF prog-id=31 op=UNLOAD
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit: BPF prog-id=48 op=LOAD
Dec 13 02:03:40.227000 audit: BPF prog-id=32 op=UNLOAD
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit: BPF prog-id=49 op=LOAD
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.227000 audit: BPF prog-id=50 op=LOAD
Dec 13 02:03:40.227000 audit: BPF prog-id=33 op=UNLOAD
Dec 13 02:03:40.227000 audit: BPF prog-id=34 op=UNLOAD
Dec 13 02:03:40.229000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.229000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.229000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.229000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.229000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.229000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.229000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.229000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.229000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.229000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.229000 audit: BPF prog-id=51 op=LOAD
Dec 13 02:03:40.229000 audit: BPF prog-id=40 op=UNLOAD
Dec 13 02:03:40.231000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.231000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.231000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.231000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.231000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.231000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.231000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.231000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.231000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit: BPF prog-id=52 op=LOAD
Dec 13 02:03:40.232000 audit: BPF prog-id=41 op=UNLOAD
Dec 13 02:03:40.232000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit: BPF prog-id=53 op=LOAD
Dec 13 02:03:40.232000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.232000 audit: BPF prog-id=54 op=LOAD
Dec 13 02:03:40.232000 audit: BPF prog-id=42 op=UNLOAD
Dec 13 02:03:40.232000 audit: BPF prog-id=43 op=UNLOAD
Dec 13 02:03:40.233000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.233000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.233000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.233000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.233000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.233000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.233000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.233000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.233000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.233000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.233000 audit: BPF prog-id=55 op=LOAD
Dec 13 02:03:40.233000 audit: BPF prog-id=35 op=UNLOAD
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit: BPF prog-id=56 op=LOAD
Dec 13 02:03:40.234000 audit: BPF prog-id=36 op=UNLOAD
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit: BPF prog-id=57 op=LOAD
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.234000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.235000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.235000 audit: BPF prog-id=58 op=LOAD
Dec 13 02:03:40.235000 audit: BPF prog-id=37 op=UNLOAD
Dec 13 02:03:40.235000 audit: BPF prog-id=38 op=UNLOAD
Dec 13 02:03:40.235000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.235000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.235000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.235000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.235000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.235000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.235000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.235000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.235000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.236000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.236000 audit: BPF prog-id=59 op=LOAD
Dec 13 02:03:40.236000 audit: BPF prog-id=44 op=UNLOAD
Dec 13 02:03:40.236000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.236000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.236000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.236000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.236000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.236000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.236000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.236000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.236000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.236000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.236000 audit: BPF prog-id=60 op=LOAD
Dec 13 02:03:40.236000 audit: BPF prog-id=39 op=UNLOAD
Dec 13 02:03:40.249040 systemd[1]: Started kubelet.service.
Dec 13 02:03:40.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:40.250679 systemd[1]: Stopping kubelet.service...
Dec 13 02:03:40.250977 systemd[1]: kubelet.service: Deactivated successfully.
Dec 13 02:03:40.251149 systemd[1]: Stopped kubelet.service.
Dec 13 02:03:40.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:40.252567 systemd[1]: Starting kubelet.service...
Dec 13 02:03:40.329799 systemd[1]: Started kubelet.service.
Dec 13 02:03:40.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:40.367403 kubelet[1446]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Dec 13 02:03:40.367403 kubelet[1446]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI.
Dec 13 02:03:40.367403 kubelet[1446]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Dec 13 02:03:40.368481 kubelet[1446]: I1213 02:03:40.368449    1446 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Dec 13 02:03:40.714817 kubelet[1446]: I1213 02:03:40.714748    1446 server.go:484] "Kubelet version" kubeletVersion="v1.30.1"
Dec 13 02:03:40.714817 kubelet[1446]: I1213 02:03:40.714807    1446 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Dec 13 02:03:40.715115 kubelet[1446]: I1213 02:03:40.715086    1446 server.go:927] "Client rotation is on, will bootstrap in background"
Dec 13 02:03:40.725154 kubelet[1446]: I1213 02:03:40.725099    1446 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Dec 13 02:03:40.736015 kubelet[1446]: I1213 02:03:40.735977    1446 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Dec 13 02:03:40.737145 kubelet[1446]: I1213 02:03:40.737102    1446 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Dec 13 02:03:40.737308 kubelet[1446]: I1213 02:03:40.737136    1446 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.101","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null}
Dec 13 02:03:40.737738 kubelet[1446]: I1213 02:03:40.737718    1446 topology_manager.go:138] "Creating topology manager with none policy"
Dec 13 02:03:40.737738 kubelet[1446]: I1213 02:03:40.737734    1446 container_manager_linux.go:301] "Creating device plugin manager"
Dec 13 02:03:40.737871 kubelet[1446]: I1213 02:03:40.737853    1446 state_mem.go:36] "Initialized new in-memory state store"
Dec 13 02:03:40.738479 kubelet[1446]: I1213 02:03:40.738447    1446 kubelet.go:400] "Attempting to sync node with API server"
Dec 13 02:03:40.738479 kubelet[1446]: I1213 02:03:40.738462    1446 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests"
Dec 13 02:03:40.738479 kubelet[1446]: I1213 02:03:40.738480    1446 kubelet.go:312] "Adding apiserver pod source"
Dec 13 02:03:40.738666 kubelet[1446]: I1213 02:03:40.738494    1446 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Dec 13 02:03:40.738666 kubelet[1446]: E1213 02:03:40.738511    1446 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:40.738666 kubelet[1446]: E1213 02:03:40.738554    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:40.742324 kubelet[1446]: I1213 02:03:40.742303    1446 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Dec 13 02:03:40.742519 kubelet[1446]: W1213 02:03:40.742498    1446 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.101" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Dec 13 02:03:40.742574 kubelet[1446]: W1213 02:03:40.742521    1446 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Dec 13 02:03:40.742574 kubelet[1446]: E1213 02:03:40.742524    1446 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.101" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Dec 13 02:03:40.742574 kubelet[1446]: E1213 02:03:40.742537    1446 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Dec 13 02:03:40.743613 kubelet[1446]: I1213 02:03:40.743585    1446 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode"
Dec 13 02:03:40.743652 kubelet[1446]: W1213 02:03:40.743634    1446 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.
Dec 13 02:03:40.744158 kubelet[1446]: I1213 02:03:40.744134    1446 server.go:1264] "Started kubelet"
Dec 13 02:03:40.744320 kubelet[1446]: I1213 02:03:40.744271    1446 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10
Dec 13 02:03:40.744689 kubelet[1446]: I1213 02:03:40.744651    1446 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock"
Dec 13 02:03:40.744780 kubelet[1446]: I1213 02:03:40.744691    1446 server.go:163] "Starting to listen" address="0.0.0.0" port=10250
Dec 13 02:03:40.750000 audit[1446]: AVC avc:  denied  { mac_admin } for  pid=1446 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.750000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Dec 13 02:03:40.750000 audit[1446]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b61d10 a1=c000651b90 a2=c000b61ce0 a3=25 items=0 ppid=1 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:40.750000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Dec 13 02:03:40.750000 audit[1446]: AVC avc:  denied  { mac_admin } for  pid=1446 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:40.750000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Dec 13 02:03:40.750000 audit[1446]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dfb000 a1=c000651ba8 a2=c000b61da0 a3=25 items=0 ppid=1 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:40.750000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Dec 13 02:03:40.751436 kubelet[1446]: I1213 02:03:40.751052    1446 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Dec 13 02:03:40.751436 kubelet[1446]: I1213 02:03:40.751107    1446 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Dec 13 02:03:40.751436 kubelet[1446]: I1213 02:03:40.751178    1446 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Dec 13 02:03:40.751436 kubelet[1446]: I1213 02:03:40.751387    1446 server.go:455] "Adding debug handlers to kubelet server"
Dec 13 02:03:40.760773 kubelet[1446]: E1213 02:03:40.757839    1446 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.101\" not found"
Dec 13 02:03:40.760773 kubelet[1446]: I1213 02:03:40.757875    1446 volume_manager.go:291] "Starting Kubelet Volume Manager"
Dec 13 02:03:40.760773 kubelet[1446]: I1213 02:03:40.757964    1446 desired_state_of_world_populator.go:149] "Desired state populator starts to run"
Dec 13 02:03:40.760773 kubelet[1446]: I1213 02:03:40.758021    1446 reconciler.go:26] "Reconciler: start to sync state"
Dec 13 02:03:40.760773 kubelet[1446]: E1213 02:03:40.758645    1446 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Dec 13 02:03:40.760773 kubelet[1446]: I1213 02:03:40.759418    1446 factory.go:221] Registration of the systemd container factory successfully
Dec 13 02:03:40.760773 kubelet[1446]: I1213 02:03:40.759489    1446 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory
Dec 13 02:03:40.761530 kubelet[1446]: I1213 02:03:40.761510    1446 factory.go:221] Registration of the containerd container factory successfully
Dec 13 02:03:40.773233 kubelet[1446]: E1213 02:03:40.773203    1446 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.101\" not found" node="10.0.0.101"
Dec 13 02:03:40.773649 kubelet[1446]: I1213 02:03:40.773633    1446 cpu_manager.go:214] "Starting CPU manager" policy="none"
Dec 13 02:03:40.773700 kubelet[1446]: I1213 02:03:40.773648    1446 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Dec 13 02:03:40.773700 kubelet[1446]: I1213 02:03:40.773678    1446 state_mem.go:36] "Initialized new in-memory state store"
Dec 13 02:03:40.859535 kubelet[1446]: I1213 02:03:40.859502    1446 kubelet_node_status.go:73] "Attempting to register node" node="10.0.0.101"
Dec 13 02:03:40.885056 kubelet[1446]: I1213 02:03:40.885007    1446 kubelet_node_status.go:76] "Successfully registered node" node="10.0.0.101"
Dec 13 02:03:41.069345 kubelet[1446]: I1213 02:03:41.069281    1446 policy_none.go:49] "None policy: Start"
Dec 13 02:03:41.070044 kubelet[1446]: I1213 02:03:41.070022    1446 memory_manager.go:170] "Starting memorymanager" policy="None"
Dec 13 02:03:41.070094 kubelet[1446]: I1213 02:03:41.070049    1446 state_mem.go:35] "Initializing new in-memory state store"
Dec 13 02:03:41.072833 kubelet[1446]: E1213 02:03:41.072814    1446 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.101\" not found"
Dec 13 02:03:41.077383 systemd[1]: Created slice kubepods.slice.
Dec 13 02:03:41.081327 systemd[1]: Created slice kubepods-burstable.slice.
Dec 13 02:03:41.083659 systemd[1]: Created slice kubepods-besteffort.slice.
Dec 13 02:03:41.088000 audit[1461]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:41.088000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe3bd17100 a2=0 a3=7ffe3bd170ec items=0 ppid=1446 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:41.088000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Dec 13 02:03:41.089000 audit[1465]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:41.089000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe4b32e890 a2=0 a3=7ffe4b32e87c items=0 ppid=1446 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:41.089000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Dec 13 02:03:41.094538 kubelet[1446]: I1213 02:03:41.094509    1446 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Dec 13 02:03:41.093000 audit[1446]: AVC avc:  denied  { mac_admin } for  pid=1446 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:41.093000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Dec 13 02:03:41.093000 audit[1446]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f82f30 a1=c0009edfc8 a2=c000f82f00 a3=25 items=0 ppid=1 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:41.093000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Dec 13 02:03:41.094824 kubelet[1446]: I1213 02:03:41.094566    1446 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Dec 13 02:03:41.094824 kubelet[1446]: I1213 02:03:41.094703    1446 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s"
Dec 13 02:03:41.094891 kubelet[1446]: I1213 02:03:41.094829    1446 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Dec 13 02:03:41.095994 kubelet[1446]: E1213 02:03:41.095967    1446 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.101\" not found"
Dec 13 02:03:41.090000 audit[1467]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:41.090000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdc9b80b60 a2=0 a3=7ffdc9b80b4c items=0 ppid=1446 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:41.090000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Dec 13 02:03:41.108000 audit[1473]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:41.108000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe3b5a97b0 a2=0 a3=7ffe3b5a979c items=0 ppid=1446 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:41.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Dec 13 02:03:41.139000 audit[1478]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:41.139000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd8ef67890 a2=0 a3=7ffd8ef6787c items=0 ppid=1446 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:41.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38
Dec 13 02:03:41.140398 kubelet[1446]: I1213 02:03:41.140359    1446 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4"
Dec 13 02:03:41.140000 audit[1479]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:41.140000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff59ab3fa0 a2=0 a3=7fff59ab3f8c items=0 ppid=1446 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:41.140000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Dec 13 02:03:41.141130 kubelet[1446]: I1213 02:03:41.141092    1446 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6"
Dec 13 02:03:41.141130 kubelet[1446]: I1213 02:03:41.141114    1446 status_manager.go:217] "Starting to sync pod status with apiserver"
Dec 13 02:03:41.141173 kubelet[1446]: I1213 02:03:41.141154    1446 kubelet.go:2337] "Starting kubelet main sync loop"
Dec 13 02:03:41.141217 kubelet[1446]: E1213 02:03:41.141195    1446 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful"
Dec 13 02:03:41.140000 audit[1480]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:41.140000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb6310a50 a2=0 a3=7ffdb6310a3c items=0 ppid=1446 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:41.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Dec 13 02:03:41.141000 audit[1481]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1481 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:41.141000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe4778e970 a2=0 a3=7ffe4778e95c items=0 ppid=1446 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:41.141000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Dec 13 02:03:41.141000 audit[1482]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1482 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:41.141000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff1a7441f0 a2=0 a3=7fff1a7441dc items=0 ppid=1446 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:41.141000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Dec 13 02:03:41.141000 audit[1483]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:41.141000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd86cadf40 a2=0 a3=7ffd86cadf2c items=0 ppid=1446 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:41.141000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Dec 13 02:03:41.142000 audit[1484]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:41.142000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffebcd391d0 a2=0 a3=7ffebcd391bc items=0 ppid=1446 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:41.142000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Dec 13 02:03:41.142000 audit[1485]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:41.142000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffff27d5180 a2=0 a3=7ffff27d516c items=0 ppid=1446 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:41.142000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Dec 13 02:03:41.173895 kubelet[1446]: E1213 02:03:41.173859    1446 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.101\" not found"
Dec 13 02:03:41.274825 kubelet[1446]: E1213 02:03:41.274777    1446 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.101\" not found"
Dec 13 02:03:41.341000 audit[1333]: USER_END pid=1333 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:41.341000 audit[1333]: CRED_DISP pid=1333 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:41.342060 sudo[1333]: pam_unix(sudo:session): session closed for user root
Dec 13 02:03:41.343745 sshd[1330]: pam_unix(sshd:session): session closed for user core
Dec 13 02:03:41.343000 audit[1330]: USER_END pid=1330 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 02:03:41.343000 audit[1330]: CRED_DISP pid=1330 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 02:03:41.345528 systemd[1]: sshd@6-10.0.0.101:22-10.0.0.1:35452.service: Deactivated successfully.
Dec 13 02:03:41.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.101:22-10.0.0.1:35452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 02:03:41.346212 systemd[1]: session-7.scope: Deactivated successfully.
Dec 13 02:03:41.346784 systemd-logind[1189]: Session 7 logged out. Waiting for processes to exit.
Dec 13 02:03:41.347544 systemd-logind[1189]: Removed session 7.
Dec 13 02:03:41.375297 kubelet[1446]: E1213 02:03:41.375274    1446 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.101\" not found"
Dec 13 02:03:41.475945 kubelet[1446]: E1213 02:03:41.475891    1446 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.101\" not found"
Dec 13 02:03:41.576482 kubelet[1446]: E1213 02:03:41.576431    1446 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.101\" not found"
Dec 13 02:03:41.677102 kubelet[1446]: E1213 02:03:41.676990    1446 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.101\" not found"
Dec 13 02:03:41.717178 kubelet[1446]: I1213 02:03:41.717148    1446 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials"
Dec 13 02:03:41.717317 kubelet[1446]: W1213 02:03:41.717297    1446 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received
Dec 13 02:03:41.717367 kubelet[1446]: W1213 02:03:41.717321    1446 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received
Dec 13 02:03:41.739490 kubelet[1446]: E1213 02:03:41.739458    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:41.777452 kubelet[1446]: E1213 02:03:41.777412    1446 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.101\" not found"
Dec 13 02:03:41.878152 kubelet[1446]: E1213 02:03:41.878105    1446 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.101\" not found"
Dec 13 02:03:41.979085 kubelet[1446]: E1213 02:03:41.978955    1446 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.101\" not found"
Dec 13 02:03:42.079663 kubelet[1446]: E1213 02:03:42.079608    1446 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.101\" not found"
Dec 13 02:03:42.180777 kubelet[1446]: I1213 02:03:42.180730    1446 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24"
Dec 13 02:03:42.181071 env[1196]: time="2024-12-13T02:03:42.181018155Z" level=info msg="No cni config template is specified, wait for other system components to drop the config."
Dec 13 02:03:42.181302 kubelet[1446]: I1213 02:03:42.181199    1446 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24"
Dec 13 02:03:42.739589 kubelet[1446]: E1213 02:03:42.739532    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:42.739589 kubelet[1446]: I1213 02:03:42.739563    1446 apiserver.go:52] "Watching apiserver"
Dec 13 02:03:42.743237 kubelet[1446]: I1213 02:03:42.743210    1446 topology_manager.go:215] "Topology Admit Handler" podUID="59f0a7f5-8486-488b-9fce-b28d042e294f" podNamespace="calico-system" podName="csi-node-driver-xbcmp"
Dec 13 02:03:42.743320 kubelet[1446]: I1213 02:03:42.743304    1446 topology_manager.go:215] "Topology Admit Handler" podUID="2f1d5388-184a-4c5c-8d71-a76f25e4ade8" podNamespace="calico-system" podName="calico-node-lwsm5"
Dec 13 02:03:42.743411 kubelet[1446]: I1213 02:03:42.743398    1446 topology_manager.go:215] "Topology Admit Handler" podUID="391b7d7c-4a3d-4eae-a926-4bdeeeb6c4d5" podNamespace="kube-system" podName="kube-proxy-6gz27"
Dec 13 02:03:42.743501 kubelet[1446]: E1213 02:03:42.743476    1446 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xbcmp" podUID="59f0a7f5-8486-488b-9fce-b28d042e294f"
Dec 13 02:03:42.748591 systemd[1]: Created slice kubepods-besteffort-pod2f1d5388_184a_4c5c_8d71_a76f25e4ade8.slice.
Dec 13 02:03:42.758411 kubelet[1446]: I1213 02:03:42.758378    1446 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world"
Dec 13 02:03:42.763423 systemd[1]: Created slice kubepods-besteffort-pod391b7d7c_4a3d_4eae_a926_4bdeeeb6c4d5.slice.
Dec 13 02:03:42.768785 kubelet[1446]: I1213 02:03:42.768732    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mf57r\" (UniqueName: \"kubernetes.io/projected/59f0a7f5-8486-488b-9fce-b28d042e294f-kube-api-access-mf57r\") pod \"csi-node-driver-xbcmp\" (UID: \"59f0a7f5-8486-488b-9fce-b28d042e294f\") " pod="calico-system/csi-node-driver-xbcmp"
Dec 13 02:03:42.768851 kubelet[1446]: I1213 02:03:42.768789    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2f1d5388-184a-4c5c-8d71-a76f25e4ade8-lib-modules\") pod \"calico-node-lwsm5\" (UID: \"2f1d5388-184a-4c5c-8d71-a76f25e4ade8\") " pod="calico-system/calico-node-lwsm5"
Dec 13 02:03:42.768851 kubelet[1446]: I1213 02:03:42.768836    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/2f1d5388-184a-4c5c-8d71-a76f25e4ade8-policysync\") pod \"calico-node-lwsm5\" (UID: \"2f1d5388-184a-4c5c-8d71-a76f25e4ade8\") " pod="calico-system/calico-node-lwsm5"
Dec 13 02:03:42.768915 kubelet[1446]: I1213 02:03:42.768855    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/2f1d5388-184a-4c5c-8d71-a76f25e4ade8-cni-bin-dir\") pod \"calico-node-lwsm5\" (UID: \"2f1d5388-184a-4c5c-8d71-a76f25e4ade8\") " pod="calico-system/calico-node-lwsm5"
Dec 13 02:03:42.768915 kubelet[1446]: I1213 02:03:42.768876    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/2f1d5388-184a-4c5c-8d71-a76f25e4ade8-cni-net-dir\") pod \"calico-node-lwsm5\" (UID: \"2f1d5388-184a-4c5c-8d71-a76f25e4ade8\") " pod="calico-system/calico-node-lwsm5"
Dec 13 02:03:42.768915 kubelet[1446]: I1213 02:03:42.768895    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/391b7d7c-4a3d-4eae-a926-4bdeeeb6c4d5-xtables-lock\") pod \"kube-proxy-6gz27\" (UID: \"391b7d7c-4a3d-4eae-a926-4bdeeeb6c4d5\") " pod="kube-system/kube-proxy-6gz27"
Dec 13 02:03:42.768915 kubelet[1446]: I1213 02:03:42.768912    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/391b7d7c-4a3d-4eae-a926-4bdeeeb6c4d5-lib-modules\") pod \"kube-proxy-6gz27\" (UID: \"391b7d7c-4a3d-4eae-a926-4bdeeeb6c4d5\") " pod="kube-system/kube-proxy-6gz27"
Dec 13 02:03:42.769051 kubelet[1446]: I1213 02:03:42.768930    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ttdf9\" (UniqueName: \"kubernetes.io/projected/391b7d7c-4a3d-4eae-a926-4bdeeeb6c4d5-kube-api-access-ttdf9\") pod \"kube-proxy-6gz27\" (UID: \"391b7d7c-4a3d-4eae-a926-4bdeeeb6c4d5\") " pod="kube-system/kube-proxy-6gz27"
Dec 13 02:03:42.769051 kubelet[1446]: I1213 02:03:42.768950    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/59f0a7f5-8486-488b-9fce-b28d042e294f-registration-dir\") pod \"csi-node-driver-xbcmp\" (UID: \"59f0a7f5-8486-488b-9fce-b28d042e294f\") " pod="calico-system/csi-node-driver-xbcmp"
Dec 13 02:03:42.769051 kubelet[1446]: I1213 02:03:42.768968    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2f1d5388-184a-4c5c-8d71-a76f25e4ade8-xtables-lock\") pod \"calico-node-lwsm5\" (UID: \"2f1d5388-184a-4c5c-8d71-a76f25e4ade8\") " pod="calico-system/calico-node-lwsm5"
Dec 13 02:03:42.769051 kubelet[1446]: I1213 02:03:42.768988    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2f1d5388-184a-4c5c-8d71-a76f25e4ade8-tigera-ca-bundle\") pod \"calico-node-lwsm5\" (UID: \"2f1d5388-184a-4c5c-8d71-a76f25e4ade8\") " pod="calico-system/calico-node-lwsm5"
Dec 13 02:03:42.769051 kubelet[1446]: I1213 02:03:42.769006    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2f1d5388-184a-4c5c-8d71-a76f25e4ade8-var-lib-calico\") pod \"calico-node-lwsm5\" (UID: \"2f1d5388-184a-4c5c-8d71-a76f25e4ade8\") " pod="calico-system/calico-node-lwsm5"
Dec 13 02:03:42.769197 kubelet[1446]: I1213 02:03:42.769046    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/59f0a7f5-8486-488b-9fce-b28d042e294f-kubelet-dir\") pod \"csi-node-driver-xbcmp\" (UID: \"59f0a7f5-8486-488b-9fce-b28d042e294f\") " pod="calico-system/csi-node-driver-xbcmp"
Dec 13 02:03:42.769197 kubelet[1446]: I1213 02:03:42.769104    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ljn4k\" (UniqueName: \"kubernetes.io/projected/2f1d5388-184a-4c5c-8d71-a76f25e4ade8-kube-api-access-ljn4k\") pod \"calico-node-lwsm5\" (UID: \"2f1d5388-184a-4c5c-8d71-a76f25e4ade8\") " pod="calico-system/calico-node-lwsm5"
Dec 13 02:03:42.769197 kubelet[1446]: I1213 02:03:42.769131    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/59f0a7f5-8486-488b-9fce-b28d042e294f-varrun\") pod \"csi-node-driver-xbcmp\" (UID: \"59f0a7f5-8486-488b-9fce-b28d042e294f\") " pod="calico-system/csi-node-driver-xbcmp"
Dec 13 02:03:42.769197 kubelet[1446]: I1213 02:03:42.769149    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/59f0a7f5-8486-488b-9fce-b28d042e294f-socket-dir\") pod \"csi-node-driver-xbcmp\" (UID: \"59f0a7f5-8486-488b-9fce-b28d042e294f\") " pod="calico-system/csi-node-driver-xbcmp"
Dec 13 02:03:42.769197 kubelet[1446]: I1213 02:03:42.769165    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/2f1d5388-184a-4c5c-8d71-a76f25e4ade8-node-certs\") pod \"calico-node-lwsm5\" (UID: \"2f1d5388-184a-4c5c-8d71-a76f25e4ade8\") " pod="calico-system/calico-node-lwsm5"
Dec 13 02:03:42.769327 kubelet[1446]: I1213 02:03:42.769194    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/2f1d5388-184a-4c5c-8d71-a76f25e4ade8-var-run-calico\") pod \"calico-node-lwsm5\" (UID: \"2f1d5388-184a-4c5c-8d71-a76f25e4ade8\") " pod="calico-system/calico-node-lwsm5"
Dec 13 02:03:42.769327 kubelet[1446]: I1213 02:03:42.769211    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/2f1d5388-184a-4c5c-8d71-a76f25e4ade8-cni-log-dir\") pod \"calico-node-lwsm5\" (UID: \"2f1d5388-184a-4c5c-8d71-a76f25e4ade8\") " pod="calico-system/calico-node-lwsm5"
Dec 13 02:03:42.769327 kubelet[1446]: I1213 02:03:42.769227    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/2f1d5388-184a-4c5c-8d71-a76f25e4ade8-flexvol-driver-host\") pod \"calico-node-lwsm5\" (UID: \"2f1d5388-184a-4c5c-8d71-a76f25e4ade8\") " pod="calico-system/calico-node-lwsm5"
Dec 13 02:03:42.769327 kubelet[1446]: I1213 02:03:42.769243    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/391b7d7c-4a3d-4eae-a926-4bdeeeb6c4d5-kube-proxy\") pod \"kube-proxy-6gz27\" (UID: \"391b7d7c-4a3d-4eae-a926-4bdeeeb6c4d5\") " pod="kube-system/kube-proxy-6gz27"
Dec 13 02:03:42.871056 kubelet[1446]: E1213 02:03:42.871012    1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:03:42.871056 kubelet[1446]: W1213 02:03:42.871036    1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:03:42.871056 kubelet[1446]: E1213 02:03:42.871049    1446 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:03:42.871297 kubelet[1446]: E1213 02:03:42.871270    1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:03:42.871338 kubelet[1446]: W1213 02:03:42.871304    1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:03:42.871338 kubelet[1446]: E1213 02:03:42.871317    1446 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:03:42.873211 kubelet[1446]: E1213 02:03:42.873194    1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:03:42.873290 kubelet[1446]: W1213 02:03:42.873210    1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:03:42.873290 kubelet[1446]: E1213 02:03:42.873225    1446 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:03:42.885379 kubelet[1446]: E1213 02:03:42.885240    1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:03:42.885379 kubelet[1446]: W1213 02:03:42.885256    1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:03:42.885379 kubelet[1446]: E1213 02:03:42.885272    1446 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:03:42.885610 kubelet[1446]: E1213 02:03:42.885595    1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:03:42.885709 kubelet[1446]: W1213 02:03:42.885670    1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:03:42.885709 kubelet[1446]: E1213 02:03:42.885695    1446 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:03:42.885913 kubelet[1446]: E1213 02:03:42.885888    1446 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 02:03:42.886012 kubelet[1446]: W1213 02:03:42.885973    1446 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 02:03:42.886012 kubelet[1446]: E1213 02:03:42.885994    1446 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 02:03:43.061259 kubelet[1446]: E1213 02:03:43.061131    1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 02:03:43.061909 env[1196]: time="2024-12-13T02:03:43.061847715Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lwsm5,Uid:2f1d5388-184a-4c5c-8d71-a76f25e4ade8,Namespace:calico-system,Attempt:0,}"
Dec 13 02:03:43.065622 kubelet[1446]: E1213 02:03:43.065599    1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 02:03:43.065875 env[1196]: time="2024-12-13T02:03:43.065855341Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6gz27,Uid:391b7d7c-4a3d-4eae-a926-4bdeeeb6c4d5,Namespace:kube-system,Attempt:0,}"
Dec 13 02:03:43.671739 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2939067515.mount: Deactivated successfully.
Dec 13 02:03:43.740344 kubelet[1446]: E1213 02:03:43.740316    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:43.747369 env[1196]: time="2024-12-13T02:03:43.747319600Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:43.799711 env[1196]: time="2024-12-13T02:03:43.799657933Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:43.942938 env[1196]: time="2024-12-13T02:03:43.942796749Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:43.947045 env[1196]: time="2024-12-13T02:03:43.946989231Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:43.948707 env[1196]: time="2024-12-13T02:03:43.948655837Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:43.954423 env[1196]: time="2024-12-13T02:03:43.954378559Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:43.955457 env[1196]: time="2024-12-13T02:03:43.955429089Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:43.957017 env[1196]: time="2024-12-13T02:03:43.956977212Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:43.985038 env[1196]: time="2024-12-13T02:03:43.984929253Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:03:43.985038 env[1196]: time="2024-12-13T02:03:43.984996058Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:03:43.985038 env[1196]: time="2024-12-13T02:03:43.985013791Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:03:43.985330 env[1196]: time="2024-12-13T02:03:43.985262858Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e7ae86ff4677035228cd89c24821d1ddd5f7248f95142f640346ef3409089a33 pid=1517 runtime=io.containerd.runc.v2
Dec 13 02:03:43.985447 env[1196]: time="2024-12-13T02:03:43.985414152Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:03:43.985447 env[1196]: time="2024-12-13T02:03:43.985439930Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:03:43.985493 env[1196]: time="2024-12-13T02:03:43.985449017Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:03:43.985610 env[1196]: time="2024-12-13T02:03:43.985586315Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/20cc04c7de33bd1d17c8a00bea3ff46741ccf712f91375473800aeaa12dcd7d8 pid=1518 runtime=io.containerd.runc.v2
Dec 13 02:03:43.998074 systemd[1]: Started cri-containerd-e7ae86ff4677035228cd89c24821d1ddd5f7248f95142f640346ef3409089a33.scope.
Dec 13 02:03:44.001301 systemd[1]: Started cri-containerd-20cc04c7de33bd1d17c8a00bea3ff46741ccf712f91375473800aeaa12dcd7d8.scope.
Dec 13 02:03:44.011469 kernel: kauditd_printk_skb: 243 callbacks suppressed
Dec 13 02:03:44.011582 kernel: audit: type=1400 audit(1734055424.008:415): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.008000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.008000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.015983 kernel: audit: type=1400 audit(1734055424.008:416): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.016030 kernel: audit: type=1400 audit(1734055424.008:417): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.008000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.008000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.021773 kernel: audit: type=1400 audit(1734055424.008:418): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.021816 kernel: audit: type=1400 audit(1734055424.008:419): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.008000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.024688 kernel: audit: type=1400 audit(1734055424.008:420): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.008000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.027583 kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Dec 13 02:03:44.027620 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64
Dec 13 02:03:44.027635 kernel: audit: backlog limit exceeded
Dec 13 02:03:44.027650 kernel: audit: audit_backlog=65 > audit_backlog_limit=64
Dec 13 02:03:44.008000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.008000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.008000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.009000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.009000 audit: BPF prog-id=61 op=LOAD
Dec 13 02:03:44.009000 audit[1534]: AVC avc:  denied  { bpf } for  pid=1534 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.009000 audit[1534]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1517 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:44.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616538366666343637373033353232386364383963323438323164
Dec 13 02:03:44.009000 audit[1534]: AVC avc:  denied  { perfmon } for  pid=1534 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.009000 audit[1534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1517 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:44.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616538366666343637373033353232386364383963323438323164
Dec 13 02:03:44.009000 audit[1534]: AVC avc:  denied  { bpf } for  pid=1534 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.009000 audit[1534]: AVC avc:  denied  { bpf } for  pid=1534 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.009000 audit[1534]: AVC avc:  denied  { bpf } for  pid=1534 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.009000 audit[1534]: AVC avc:  denied  { perfmon } for  pid=1534 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.009000 audit[1534]: AVC avc:  denied  { perfmon } for  pid=1534 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.009000 audit[1534]: AVC avc:  denied  { perfmon } for  pid=1534 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.009000 audit[1534]: AVC avc:  denied  { perfmon } for  pid=1534 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.009000 audit[1534]: AVC avc:  denied  { perfmon } for  pid=1534 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.009000 audit[1534]: AVC avc:  denied  { bpf } for  pid=1534 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.016000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.016000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.016000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.016000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.016000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.016000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.016000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.016000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.016000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.009000 audit[1534]: AVC avc:  denied  { bpf } for  pid=1534 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.009000 audit: BPF prog-id=62 op=LOAD
Dec 13 02:03:44.009000 audit[1534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00020b1d0 items=0 ppid=1517 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:44.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616538366666343637373033353232386364383963323438323164
Dec 13 02:03:44.018000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit: BPF prog-id=63 op=LOAD
Dec 13 02:03:44.018000 audit[1534]: AVC avc:  denied  { bpf } for  pid=1534 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit[1534]: AVC avc:  denied  { bpf } for  pid=1534 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit[1534]: AVC avc:  denied  { perfmon } for  pid=1534 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit[1534]: AVC avc:  denied  { perfmon } for  pid=1534 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit[1534]: AVC avc:  denied  { perfmon } for  pid=1534 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit[1534]: AVC avc:  denied  { perfmon } for  pid=1534 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit[1534]: AVC avc:  denied  { perfmon } for  pid=1534 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit[1534]: AVC avc:  denied  { bpf } for  pid=1534 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit[1539]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1518 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:44.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230636330346337646533336264316431376338613030626561336666
Dec 13 02:03:44.018000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit[1539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1518 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:44.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230636330346337646533336264316431376338613030626561336666
Dec 13 02:03:44.018000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit[1534]: AVC avc:  denied  { bpf } for  pid=1534 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.018000 audit: BPF prog-id=64 op=LOAD
Dec 13 02:03:44.018000 audit[1534]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00020b218 items=0 ppid=1517 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:44.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616538366666343637373033353232386364383963323438323164
Dec 13 02:03:44.030000 audit: BPF prog-id=64 op=UNLOAD
Dec 13 02:03:44.018000 audit[1539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000d5d10 items=0 ppid=1518 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:44.030000 audit: BPF prog-id=62 op=UNLOAD
Dec 13 02:03:44.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230636330346337646533336264316431376338613030626561336666
Dec 13 02:03:44.030000 audit[1534]: AVC avc:  denied  { bpf } for  pid=1534 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1534]: AVC avc:  denied  { bpf } for  pid=1534 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1534]: AVC avc:  denied  { bpf } for  pid=1534 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1534]: AVC avc:  denied  { perfmon } for  pid=1534 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1534]: AVC avc:  denied  { perfmon } for  pid=1534 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1534]: AVC avc:  denied  { perfmon } for  pid=1534 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1534]: AVC avc:  denied  { perfmon } for  pid=1534 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1534]: AVC avc:  denied  { perfmon } for  pid=1534 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1534]: AVC avc:  denied  { bpf } for  pid=1534 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit: BPF prog-id=66 op=LOAD
Dec 13 02:03:44.030000 audit[1539]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000d5d58 items=0 ppid=1518 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:44.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230636330346337646533336264316431376338613030626561336666
Dec 13 02:03:44.030000 audit: BPF prog-id=66 op=UNLOAD
Dec 13 02:03:44.030000 audit: BPF prog-id=65 op=UNLOAD
Dec 13 02:03:44.030000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit[1534]: AVC avc:  denied  { bpf } for  pid=1534 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit: BPF prog-id=67 op=LOAD
Dec 13 02:03:44.030000 audit[1534]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00020b628 items=0 ppid=1517 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:44.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616538366666343637373033353232386364383963323438323164
Dec 13 02:03:44.030000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:44.030000 audit: BPF prog-id=68 op=LOAD
Dec 13 02:03:44.030000 audit[1539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003be168 items=0 ppid=1518 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:44.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230636330346337646533336264316431376338613030626561336666
Dec 13 02:03:44.041693 env[1196]: time="2024-12-13T02:03:44.041659913Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6gz27,Uid:391b7d7c-4a3d-4eae-a926-4bdeeeb6c4d5,Namespace:kube-system,Attempt:0,} returns sandbox id \"20cc04c7de33bd1d17c8a00bea3ff46741ccf712f91375473800aeaa12dcd7d8\""
Dec 13 02:03:44.042793 kubelet[1446]: E1213 02:03:44.042640    1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 02:03:44.043444 env[1196]: time="2024-12-13T02:03:44.043406729Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lwsm5,Uid:2f1d5388-184a-4c5c-8d71-a76f25e4ade8,Namespace:calico-system,Attempt:0,} returns sandbox id \"e7ae86ff4677035228cd89c24821d1ddd5f7248f95142f640346ef3409089a33\""
Dec 13 02:03:44.043933 kubelet[1446]: E1213 02:03:44.043916    1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 02:03:44.044915 env[1196]: time="2024-12-13T02:03:44.044870133Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\""
Dec 13 02:03:44.141962 kubelet[1446]: E1213 02:03:44.141922    1446 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xbcmp" podUID="59f0a7f5-8486-488b-9fce-b28d042e294f"
Dec 13 02:03:44.741349 kubelet[1446]: E1213 02:03:44.741298    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:44.977695 systemd[1]: run-containerd-runc-k8s.io-e7ae86ff4677035228cd89c24821d1ddd5f7248f95142f640346ef3409089a33-runc.xCDnWp.mount: Deactivated successfully.
Dec 13 02:03:45.525520 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount860393044.mount: Deactivated successfully.
Dec 13 02:03:45.653634 env[1196]: time="2024-12-13T02:03:45.653574207Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:45.655422 env[1196]: time="2024-12-13T02:03:45.655385234Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:45.656809 env[1196]: time="2024-12-13T02:03:45.656738973Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:45.658182 env[1196]: time="2024-12-13T02:03:45.658151381Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:45.658607 env[1196]: time="2024-12-13T02:03:45.658576489Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\""
Dec 13 02:03:45.659663 env[1196]: time="2024-12-13T02:03:45.659638941Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\""
Dec 13 02:03:45.660905 env[1196]: time="2024-12-13T02:03:45.660875350Z" level=info msg="CreateContainer within sandbox \"e7ae86ff4677035228cd89c24821d1ddd5f7248f95142f640346ef3409089a33\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}"
Dec 13 02:03:45.678362 env[1196]: time="2024-12-13T02:03:45.678294847Z" level=info msg="CreateContainer within sandbox \"e7ae86ff4677035228cd89c24821d1ddd5f7248f95142f640346ef3409089a33\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"840928ae6957e85abfa0043922dbc84f1bc758e410a4af105aea4f452fabeec5\""
Dec 13 02:03:45.679059 env[1196]: time="2024-12-13T02:03:45.679010590Z" level=info msg="StartContainer for \"840928ae6957e85abfa0043922dbc84f1bc758e410a4af105aea4f452fabeec5\""
Dec 13 02:03:45.694540 systemd[1]: Started cri-containerd-840928ae6957e85abfa0043922dbc84f1bc758e410a4af105aea4f452fabeec5.scope.
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { perfmon } for  pid=1591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=7f7e602dc758 items=0 ppid=1517 pid=1591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:45.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834303932386165363935376538356162666130303433393232646263
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { bpf } for  pid=1591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { bpf } for  pid=1591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { bpf } for  pid=1591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { perfmon } for  pid=1591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { perfmon } for  pid=1591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { perfmon } for  pid=1591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { perfmon } for  pid=1591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { perfmon } for  pid=1591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { bpf } for  pid=1591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { bpf } for  pid=1591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit: BPF prog-id=69 op=LOAD
Dec 13 02:03:45.707000 audit[1591]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000267ba8 items=0 ppid=1517 pid=1591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:45.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834303932386165363935376538356162666130303433393232646263
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { bpf } for  pid=1591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { bpf } for  pid=1591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { perfmon } for  pid=1591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { perfmon } for  pid=1591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { perfmon } for  pid=1591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { perfmon } for  pid=1591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { perfmon } for  pid=1591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { bpf } for  pid=1591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { bpf } for  pid=1591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit: BPF prog-id=70 op=LOAD
Dec 13 02:03:45.707000 audit[1591]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000267bf8 items=0 ppid=1517 pid=1591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:45.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834303932386165363935376538356162666130303433393232646263
Dec 13 02:03:45.707000 audit: BPF prog-id=70 op=UNLOAD
Dec 13 02:03:45.707000 audit: BPF prog-id=69 op=UNLOAD
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { bpf } for  pid=1591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { bpf } for  pid=1591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { bpf } for  pid=1591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { perfmon } for  pid=1591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { perfmon } for  pid=1591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { perfmon } for  pid=1591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { perfmon } for  pid=1591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { perfmon } for  pid=1591 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { bpf } for  pid=1591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit[1591]: AVC avc:  denied  { bpf } for  pid=1591 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:45.707000 audit: BPF prog-id=71 op=LOAD
Dec 13 02:03:45.707000 audit[1591]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000267c88 items=0 ppid=1517 pid=1591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:45.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834303932386165363935376538356162666130303433393232646263
Dec 13 02:03:45.720999 env[1196]: time="2024-12-13T02:03:45.720938480Z" level=info msg="StartContainer for \"840928ae6957e85abfa0043922dbc84f1bc758e410a4af105aea4f452fabeec5\" returns successfully"
Dec 13 02:03:45.728383 systemd[1]: cri-containerd-840928ae6957e85abfa0043922dbc84f1bc758e410a4af105aea4f452fabeec5.scope: Deactivated successfully.
Dec 13 02:03:45.732000 audit: BPF prog-id=71 op=UNLOAD
Dec 13 02:03:45.742032 kubelet[1446]: E1213 02:03:45.741969    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:45.841560 env[1196]: time="2024-12-13T02:03:45.841484146Z" level=info msg="shim disconnected" id=840928ae6957e85abfa0043922dbc84f1bc758e410a4af105aea4f452fabeec5
Dec 13 02:03:45.841560 env[1196]: time="2024-12-13T02:03:45.841556582Z" level=warning msg="cleaning up after shim disconnected" id=840928ae6957e85abfa0043922dbc84f1bc758e410a4af105aea4f452fabeec5 namespace=k8s.io
Dec 13 02:03:45.841560 env[1196]: time="2024-12-13T02:03:45.841569746Z" level=info msg="cleaning up dead shim"
Dec 13 02:03:45.849339 env[1196]: time="2024-12-13T02:03:45.849274726Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:03:45Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1629 runtime=io.containerd.runc.v2\n"
Dec 13 02:03:46.141911 kubelet[1446]: E1213 02:03:46.141371    1446 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xbcmp" podUID="59f0a7f5-8486-488b-9fce-b28d042e294f"
Dec 13 02:03:46.152076 kubelet[1446]: E1213 02:03:46.152058    1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 02:03:46.742604 kubelet[1446]: E1213 02:03:46.742543    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:47.097132 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3506039820.mount: Deactivated successfully.
Dec 13 02:03:47.671863 env[1196]: time="2024-12-13T02:03:47.671804089Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:47.674120 env[1196]: time="2024-12-13T02:03:47.674079917Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:47.675605 env[1196]: time="2024-12-13T02:03:47.675557828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:47.676715 env[1196]: time="2024-12-13T02:03:47.676685143Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:47.677134 env[1196]: time="2024-12-13T02:03:47.677107435Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\""
Dec 13 02:03:47.678095 env[1196]: time="2024-12-13T02:03:47.678059079Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\""
Dec 13 02:03:47.679195 env[1196]: time="2024-12-13T02:03:47.679164733Z" level=info msg="CreateContainer within sandbox \"20cc04c7de33bd1d17c8a00bea3ff46741ccf712f91375473800aeaa12dcd7d8\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}"
Dec 13 02:03:47.691943 env[1196]: time="2024-12-13T02:03:47.691894626Z" level=info msg="CreateContainer within sandbox \"20cc04c7de33bd1d17c8a00bea3ff46741ccf712f91375473800aeaa12dcd7d8\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c136aff31730317b3aa837d01597fefafffcb4c979779317da2d5f87b359a83f\""
Dec 13 02:03:47.692388 env[1196]: time="2024-12-13T02:03:47.692362443Z" level=info msg="StartContainer for \"c136aff31730317b3aa837d01597fefafffcb4c979779317da2d5f87b359a83f\""
Dec 13 02:03:47.710547 systemd[1]: Started cri-containerd-c136aff31730317b3aa837d01597fefafffcb4c979779317da2d5f87b359a83f.scope.
Dec 13 02:03:47.721000 audit[1655]: AVC avc:  denied  { perfmon } for  pid=1655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.721000 audit[1655]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7f7fb282c598 items=0 ppid=1518 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333661666633313733303331376233616138333764303135393766
Dec 13 02:03:47.721000 audit[1655]: AVC avc:  denied  { bpf } for  pid=1655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.721000 audit[1655]: AVC avc:  denied  { bpf } for  pid=1655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.721000 audit[1655]: AVC avc:  denied  { bpf } for  pid=1655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.721000 audit[1655]: AVC avc:  denied  { perfmon } for  pid=1655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.721000 audit[1655]: AVC avc:  denied  { perfmon } for  pid=1655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.721000 audit[1655]: AVC avc:  denied  { perfmon } for  pid=1655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.721000 audit[1655]: AVC avc:  denied  { perfmon } for  pid=1655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.721000 audit[1655]: AVC avc:  denied  { perfmon } for  pid=1655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.721000 audit[1655]: AVC avc:  denied  { bpf } for  pid=1655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.721000 audit[1655]: AVC avc:  denied  { bpf } for  pid=1655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.721000 audit: BPF prog-id=72 op=LOAD
Dec 13 02:03:47.721000 audit[1655]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c00028af48 items=0 ppid=1518 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333661666633313733303331376233616138333764303135393766
Dec 13 02:03:47.722000 audit[1655]: AVC avc:  denied  { bpf } for  pid=1655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.722000 audit[1655]: AVC avc:  denied  { bpf } for  pid=1655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.722000 audit[1655]: AVC avc:  denied  { perfmon } for  pid=1655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.722000 audit[1655]: AVC avc:  denied  { perfmon } for  pid=1655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.722000 audit[1655]: AVC avc:  denied  { perfmon } for  pid=1655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.722000 audit[1655]: AVC avc:  denied  { perfmon } for  pid=1655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.722000 audit[1655]: AVC avc:  denied  { perfmon } for  pid=1655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.722000 audit[1655]: AVC avc:  denied  { bpf } for  pid=1655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.722000 audit[1655]: AVC avc:  denied  { bpf } for  pid=1655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.722000 audit: BPF prog-id=73 op=LOAD
Dec 13 02:03:47.722000 audit[1655]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c00028af98 items=0 ppid=1518 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333661666633313733303331376233616138333764303135393766
Dec 13 02:03:47.722000 audit: BPF prog-id=73 op=UNLOAD
Dec 13 02:03:47.722000 audit: BPF prog-id=72 op=UNLOAD
Dec 13 02:03:47.722000 audit[1655]: AVC avc:  denied  { bpf } for  pid=1655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.722000 audit[1655]: AVC avc:  denied  { bpf } for  pid=1655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.722000 audit[1655]: AVC avc:  denied  { bpf } for  pid=1655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.722000 audit[1655]: AVC avc:  denied  { perfmon } for  pid=1655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.722000 audit[1655]: AVC avc:  denied  { perfmon } for  pid=1655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.722000 audit[1655]: AVC avc:  denied  { perfmon } for  pid=1655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.722000 audit[1655]: AVC avc:  denied  { perfmon } for  pid=1655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.722000 audit[1655]: AVC avc:  denied  { perfmon } for  pid=1655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.722000 audit[1655]: AVC avc:  denied  { bpf } for  pid=1655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.722000 audit[1655]: AVC avc:  denied  { bpf } for  pid=1655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:47.722000 audit: BPF prog-id=74 op=LOAD
Dec 13 02:03:47.722000 audit[1655]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c00028b028 items=0 ppid=1518 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333661666633313733303331376233616138333764303135393766
Dec 13 02:03:47.735823 env[1196]: time="2024-12-13T02:03:47.735776640Z" level=info msg="StartContainer for \"c136aff31730317b3aa837d01597fefafffcb4c979779317da2d5f87b359a83f\" returns successfully"
Dec 13 02:03:47.742784 kubelet[1446]: E1213 02:03:47.742722    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:47.791000 audit[1708]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.791000 audit[1709]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:47.791000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce81d1440 a2=0 a3=7ffce81d142c items=0 ppid=1666 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.791000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Dec 13 02:03:47.791000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe550a030 a2=0 a3=7fffe550a01c items=0 ppid=1666 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.791000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Dec 13 02:03:47.792000 audit[1710]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:47.792000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc8ec4fb0 a2=0 a3=7fffc8ec4f9c items=0 ppid=1666 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.792000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Dec 13 02:03:47.792000 audit[1711]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.792000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffaea5d600 a2=0 a3=7fffaea5d5ec items=0 ppid=1666 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.792000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Dec 13 02:03:47.793000 audit[1712]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:47.793000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd2906df0 a2=0 a3=7ffcd2906ddc items=0 ppid=1666 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.793000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Dec 13 02:03:47.794000 audit[1713]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.794000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe31dc8200 a2=0 a3=7ffe31dc81ec items=0 ppid=1666 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Dec 13 02:03:47.892000 audit[1714]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.892000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff63d000a0 a2=0 a3=7fff63d0008c items=0 ppid=1666 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.892000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Dec 13 02:03:47.895000 audit[1716]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.895000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcfc64f270 a2=0 a3=7ffcfc64f25c items=0 ppid=1666 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.895000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365
Dec 13 02:03:47.898000 audit[1719]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.898000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe8c0239a0 a2=0 a3=7ffe8c02398c items=0 ppid=1666 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.898000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669
Dec 13 02:03:47.899000 audit[1720]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.899000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7120ddc0 a2=0 a3=7ffd7120ddac items=0 ppid=1666 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.899000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Dec 13 02:03:47.902000 audit[1722]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.902000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffde990e1a0 a2=0 a3=7ffde990e18c items=0 ppid=1666 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.902000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Dec 13 02:03:47.903000 audit[1723]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.903000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd0e68fb0 a2=0 a3=7ffdd0e68f9c items=0 ppid=1666 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.903000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Dec 13 02:03:47.905000 audit[1725]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.905000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeec9b8330 a2=0 a3=7ffeec9b831c items=0 ppid=1666 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.905000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Dec 13 02:03:47.908000 audit[1728]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.908000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffcbd74190 a2=0 a3=7fffcbd7417c items=0 ppid=1666 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.908000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53
Dec 13 02:03:47.910000 audit[1729]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.910000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea4816a50 a2=0 a3=7ffea4816a3c items=0 ppid=1666 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.910000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Dec 13 02:03:47.912000 audit[1731]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.912000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb0358ed0 a2=0 a3=7ffeb0358ebc items=0 ppid=1666 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.912000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Dec 13 02:03:47.913000 audit[1732]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.913000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0bdca2b0 a2=0 a3=7ffc0bdca29c items=0 ppid=1666 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.913000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Dec 13 02:03:47.916000 audit[1734]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.916000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff882790c0 a2=0 a3=7fff882790ac items=0 ppid=1666 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.916000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Dec 13 02:03:47.919000 audit[1737]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.919000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc3849fb10 a2=0 a3=7ffc3849fafc items=0 ppid=1666 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.919000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Dec 13 02:03:47.923000 audit[1740]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.923000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe0e6022c0 a2=0 a3=7ffe0e6022ac items=0 ppid=1666 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.923000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Dec 13 02:03:47.924000 audit[1741]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.924000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe53c40b20 a2=0 a3=7ffe53c40b0c items=0 ppid=1666 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.924000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Dec 13 02:03:47.927000 audit[1743]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.927000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff029c1630 a2=0 a3=7fff029c161c items=0 ppid=1666 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.927000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Dec 13 02:03:47.948000 audit[1749]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.948000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffe6f09fc0 a2=0 a3=7fffe6f09fac items=0 ppid=1666 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.948000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Dec 13 02:03:47.949000 audit[1750]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.949000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf5627f50 a2=0 a3=7ffdf5627f3c items=0 ppid=1666 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.949000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Dec 13 02:03:47.952000 audit[1752]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 02:03:47.952000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff4e53b110 a2=0 a3=7fff4e53b0fc items=0 ppid=1666 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.952000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Dec 13 02:03:47.969000 audit[1758]: NETFILTER_CFG table=filter:39 family=2 entries=10 op=nft_register_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:03:47.969000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffe26d3db40 a2=0 a3=7ffe26d3db2c items=0 ppid=1666 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.969000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:03:47.986000 audit[1758]: NETFILTER_CFG table=nat:40 family=2 entries=14 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:03:47.986000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffe26d3db40 a2=0 a3=7ffe26d3db2c items=0 ppid=1666 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.986000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:03:47.988000 audit[1764]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:47.988000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffca329f0e0 a2=0 a3=7ffca329f0cc items=0 ppid=1666 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.988000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Dec 13 02:03:47.990000 audit[1766]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:47.990000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe30b5aa90 a2=0 a3=7ffe30b5aa7c items=0 ppid=1666 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.990000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963
Dec 13 02:03:47.994000 audit[1769]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:47.994000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffffb18150 a2=0 a3=7fffffb1813c items=0 ppid=1666 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.994000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276
Dec 13 02:03:47.995000 audit[1770]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:47.995000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc92821a10 a2=0 a3=7ffc928219fc items=0 ppid=1666 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.995000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Dec 13 02:03:47.997000 audit[1772]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:47.997000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffda8309760 a2=0 a3=7ffda830974c items=0 ppid=1666 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.997000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Dec 13 02:03:47.998000 audit[1773]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:47.998000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe70c7b710 a2=0 a3=7ffe70c7b6fc items=0 ppid=1666 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:47.998000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Dec 13 02:03:48.000000 audit[1775]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:48.000000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd2a752900 a2=0 a3=7ffd2a7528ec items=0 ppid=1666 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:48.000000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245
Dec 13 02:03:48.004000 audit[1778]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:48.004000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff30387e70 a2=0 a3=7fff30387e5c items=0 ppid=1666 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:48.004000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Dec 13 02:03:48.006000 audit[1779]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:48.006000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc17e71880 a2=0 a3=7ffc17e7186c items=0 ppid=1666 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:48.006000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Dec 13 02:03:48.008000 audit[1781]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:48.008000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe1df41870 a2=0 a3=7ffe1df4185c items=0 ppid=1666 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:48.008000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Dec 13 02:03:48.009000 audit[1782]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:48.009000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda29f6860 a2=0 a3=7ffda29f684c items=0 ppid=1666 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:48.009000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Dec 13 02:03:48.011000 audit[1784]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:48.011000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed41aa1a0 a2=0 a3=7ffed41aa18c items=0 ppid=1666 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:48.011000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Dec 13 02:03:48.015000 audit[1787]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:48.015000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff53d93670 a2=0 a3=7fff53d9365c items=0 ppid=1666 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:48.015000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Dec 13 02:03:48.019000 audit[1790]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:48.019000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd47b00bb0 a2=0 a3=7ffd47b00b9c items=0 ppid=1666 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:48.019000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C
Dec 13 02:03:48.020000 audit[1791]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:48.020000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe823087b0 a2=0 a3=7ffe8230879c items=0 ppid=1666 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:48.020000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Dec 13 02:03:48.023000 audit[1793]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:48.023000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff7f3391d0 a2=0 a3=7fff7f3391bc items=0 ppid=1666 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:48.023000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Dec 13 02:03:48.026000 audit[1796]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:48.026000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff06503960 a2=0 a3=7fff0650394c items=0 ppid=1666 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:48.026000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Dec 13 02:03:48.027000 audit[1797]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:48.027000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc9f48580 a2=0 a3=7ffdc9f4856c items=0 ppid=1666 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:48.027000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Dec 13 02:03:48.029000 audit[1799]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:48.029000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff2db2a3b0 a2=0 a3=7fff2db2a39c items=0 ppid=1666 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:48.029000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Dec 13 02:03:48.030000 audit[1800]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:48.030000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0c542b10 a2=0 a3=7ffd0c542afc items=0 ppid=1666 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:48.030000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Dec 13 02:03:48.033000 audit[1802]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:48.033000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe5ea9eeb0 a2=0 a3=7ffe5ea9ee9c items=0 ppid=1666 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:48.033000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Dec 13 02:03:48.036000 audit[1805]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 02:03:48.036000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffba7a3310 a2=0 a3=7fffba7a32fc items=0 ppid=1666 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:48.036000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Dec 13 02:03:48.039000 audit[1807]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Dec 13 02:03:48.039000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffd4f256d30 a2=0 a3=7ffd4f256d1c items=0 ppid=1666 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:48.039000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:03:48.040000 audit[1807]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Dec 13 02:03:48.040000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd4f256d30 a2=0 a3=7ffd4f256d1c items=0 ppid=1666 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:48.040000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:03:48.141908 kubelet[1446]: E1213 02:03:48.141845    1446 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xbcmp" podUID="59f0a7f5-8486-488b-9fce-b28d042e294f"
Dec 13 02:03:48.156074 kubelet[1446]: E1213 02:03:48.156045    1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 02:03:48.166162 kubelet[1446]: I1213 02:03:48.166083    1446 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-6gz27" podStartSLOduration=3.5327879429999998 podStartE2EDuration="7.166061428s" podCreationTimestamp="2024-12-13 02:03:41 +0000 UTC" firstStartedPulling="2024-12-13 02:03:44.044592803 +0000 UTC m=+3.711588665" lastFinishedPulling="2024-12-13 02:03:47.677866288 +0000 UTC m=+7.344862150" observedRunningTime="2024-12-13 02:03:48.166011614 +0000 UTC m=+7.833007476" watchObservedRunningTime="2024-12-13 02:03:48.166061428 +0000 UTC m=+7.833057290"
Dec 13 02:03:48.743828 kubelet[1446]: E1213 02:03:48.743740    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:49.157413 kubelet[1446]: E1213 02:03:49.157358    1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 02:03:49.744485 kubelet[1446]: E1213 02:03:49.744422    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:50.142129 kubelet[1446]: E1213 02:03:50.142058    1446 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xbcmp" podUID="59f0a7f5-8486-488b-9fce-b28d042e294f"
Dec 13 02:03:50.745381 kubelet[1446]: E1213 02:03:50.745343    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:51.746306 kubelet[1446]: E1213 02:03:51.746239    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:52.141906 kubelet[1446]: E1213 02:03:52.141850    1446 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xbcmp" podUID="59f0a7f5-8486-488b-9fce-b28d042e294f"
Dec 13 02:03:52.746658 kubelet[1446]: E1213 02:03:52.746592    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:52.946129 env[1196]: time="2024-12-13T02:03:52.946054531Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:52.964225 env[1196]: time="2024-12-13T02:03:52.964162720Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:52.991396 env[1196]: time="2024-12-13T02:03:52.991342452Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:53.005061 env[1196]: time="2024-12-13T02:03:53.004960010Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:03:53.005621 env[1196]: time="2024-12-13T02:03:53.005585333Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\""
Dec 13 02:03:53.007588 env[1196]: time="2024-12-13T02:03:53.007555187Z" level=info msg="CreateContainer within sandbox \"e7ae86ff4677035228cd89c24821d1ddd5f7248f95142f640346ef3409089a33\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}"
Dec 13 02:03:53.246406 env[1196]: time="2024-12-13T02:03:53.246328903Z" level=info msg="CreateContainer within sandbox \"e7ae86ff4677035228cd89c24821d1ddd5f7248f95142f640346ef3409089a33\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"58ab795112b8fbce0bf67295688d575280b64a97c27ee5c10b8902d68d21c564\""
Dec 13 02:03:53.247011 env[1196]: time="2024-12-13T02:03:53.246985805Z" level=info msg="StartContainer for \"58ab795112b8fbce0bf67295688d575280b64a97c27ee5c10b8902d68d21c564\""
Dec 13 02:03:53.272438 systemd[1]: Started cri-containerd-58ab795112b8fbce0bf67295688d575280b64a97c27ee5c10b8902d68d21c564.scope.
Dec 13 02:03:53.314466 kernel: kauditd_printk_skb: 348 callbacks suppressed
Dec 13 02:03:53.314610 kernel: audit: type=1400 audit(1734055433.309:515): avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.309000 audit[1815]: AVC avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.309000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f0f03f99b38 items=0 ppid=1517 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:53.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538616237393531313262386662636530626636373239353638386435
Dec 13 02:03:53.324960 kernel: audit: type=1300 audit(1734055433.309:515): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f0f03f99b38 items=0 ppid=1517 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:53.325034 kernel: audit: type=1327 audit(1734055433.309:515): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538616237393531313262386662636530626636373239353638386435
Dec 13 02:03:53.309000 audit[1815]: AVC avc:  denied  { bpf } for  pid=1815 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.328458 kernel: audit: type=1400 audit(1734055433.309:516): avc:  denied  { bpf } for  pid=1815 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.309000 audit[1815]: AVC avc:  denied  { bpf } for  pid=1815 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.332369 kernel: audit: type=1400 audit(1734055433.309:516): avc:  denied  { bpf } for  pid=1815 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.332451 kernel: audit: type=1400 audit(1734055433.309:516): avc:  denied  { bpf } for  pid=1815 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.309000 audit[1815]: AVC avc:  denied  { bpf } for  pid=1815 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.347511 kernel: audit: type=1400 audit(1734055433.309:516): avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.309000 audit[1815]: AVC avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.309000 audit[1815]: AVC avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.353447 kernel: audit: type=1400 audit(1734055433.309:516): avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.353502 kernel: audit: type=1400 audit(1734055433.309:516): avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.309000 audit[1815]: AVC avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.309000 audit[1815]: AVC avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.359389 kernel: audit: type=1400 audit(1734055433.309:516): avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.309000 audit[1815]: AVC avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.309000 audit[1815]: AVC avc:  denied  { bpf } for  pid=1815 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.309000 audit[1815]: AVC avc:  denied  { bpf } for  pid=1815 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.309000 audit: BPF prog-id=75 op=LOAD
Dec 13 02:03:53.309000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d5ba8 items=0 ppid=1517 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:53.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538616237393531313262386662636530626636373239353638386435
Dec 13 02:03:53.314000 audit[1815]: AVC avc:  denied  { bpf } for  pid=1815 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.314000 audit[1815]: AVC avc:  denied  { bpf } for  pid=1815 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.314000 audit[1815]: AVC avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.314000 audit[1815]: AVC avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.314000 audit[1815]: AVC avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.314000 audit[1815]: AVC avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.314000 audit[1815]: AVC avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.314000 audit[1815]: AVC avc:  denied  { bpf } for  pid=1815 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.314000 audit[1815]: AVC avc:  denied  { bpf } for  pid=1815 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.314000 audit: BPF prog-id=76 op=LOAD
Dec 13 02:03:53.314000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d5bf8 items=0 ppid=1517 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:53.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538616237393531313262386662636530626636373239353638386435
Dec 13 02:03:53.314000 audit: BPF prog-id=76 op=UNLOAD
Dec 13 02:03:53.314000 audit: BPF prog-id=75 op=UNLOAD
Dec 13 02:03:53.314000 audit[1815]: AVC avc:  denied  { bpf } for  pid=1815 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.314000 audit[1815]: AVC avc:  denied  { bpf } for  pid=1815 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.314000 audit[1815]: AVC avc:  denied  { bpf } for  pid=1815 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.314000 audit[1815]: AVC avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.314000 audit[1815]: AVC avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.314000 audit[1815]: AVC avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.314000 audit[1815]: AVC avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.314000 audit[1815]: AVC avc:  denied  { perfmon } for  pid=1815 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.314000 audit[1815]: AVC avc:  denied  { bpf } for  pid=1815 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.314000 audit[1815]: AVC avc:  denied  { bpf } for  pid=1815 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:03:53.314000 audit: BPF prog-id=77 op=LOAD
Dec 13 02:03:53.314000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d5c88 items=0 ppid=1517 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:53.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538616237393531313262386662636530626636373239353638386435
Dec 13 02:03:53.747496 kubelet[1446]: E1213 02:03:53.747458    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:54.052387 env[1196]: time="2024-12-13T02:03:54.052262376Z" level=info msg="StartContainer for \"58ab795112b8fbce0bf67295688d575280b64a97c27ee5c10b8902d68d21c564\" returns successfully"
Dec 13 02:03:54.142548 kubelet[1446]: E1213 02:03:54.142462    1446 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xbcmp" podUID="59f0a7f5-8486-488b-9fce-b28d042e294f"
Dec 13 02:03:54.165639 kubelet[1446]: E1213 02:03:54.165605    1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 02:03:54.747780 kubelet[1446]: E1213 02:03:54.747730    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:55.167008 kubelet[1446]: E1213 02:03:55.166981    1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 02:03:55.748768 kubelet[1446]: E1213 02:03:55.748700    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:56.142095 kubelet[1446]: E1213 02:03:56.142047    1446 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xbcmp" podUID="59f0a7f5-8486-488b-9fce-b28d042e294f"
Dec 13 02:03:56.368516 systemd[1]: cri-containerd-58ab795112b8fbce0bf67295688d575280b64a97c27ee5c10b8902d68d21c564.scope: Deactivated successfully.
Dec 13 02:03:56.368769 systemd[1]: cri-containerd-58ab795112b8fbce0bf67295688d575280b64a97c27ee5c10b8902d68d21c564.scope: Consumed 1.320s CPU time.
Dec 13 02:03:56.383217 kubelet[1446]: I1213 02:03:56.383178    1446 kubelet_node_status.go:497] "Fast updating node status as it just became ready"
Dec 13 02:03:56.443000 audit: BPF prog-id=77 op=UNLOAD
Dec 13 02:03:56.462457 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-58ab795112b8fbce0bf67295688d575280b64a97c27ee5c10b8902d68d21c564-rootfs.mount: Deactivated successfully.
Dec 13 02:03:56.749057 kubelet[1446]: E1213 02:03:56.748915    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:56.953726 env[1196]: time="2024-12-13T02:03:56.953648260Z" level=info msg="shim disconnected" id=58ab795112b8fbce0bf67295688d575280b64a97c27ee5c10b8902d68d21c564
Dec 13 02:03:56.953726 env[1196]: time="2024-12-13T02:03:56.953723751Z" level=warning msg="cleaning up after shim disconnected" id=58ab795112b8fbce0bf67295688d575280b64a97c27ee5c10b8902d68d21c564 namespace=k8s.io
Dec 13 02:03:56.954125 env[1196]: time="2024-12-13T02:03:56.953741104Z" level=info msg="cleaning up dead shim"
Dec 13 02:03:56.961570 env[1196]: time="2024-12-13T02:03:56.961455251Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:03:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1855 runtime=io.containerd.runc.v2\n"
Dec 13 02:03:57.170631 kubelet[1446]: E1213 02:03:57.170234    1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 02:03:57.170921 env[1196]: time="2024-12-13T02:03:57.170877723Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\""
Dec 13 02:03:57.229000 audit[1869]: NETFILTER_CFG table=filter:65 family=2 entries=17 op=nft_register_rule pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:03:57.229000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcc6b7a430 a2=0 a3=7ffcc6b7a41c items=0 ppid=1666 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:57.229000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:03:57.235000 audit[1869]: NETFILTER_CFG table=nat:66 family=2 entries=19 op=nft_register_chain pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:03:57.235000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffcc6b7a430 a2=0 a3=7ffcc6b7a41c items=0 ppid=1666 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:03:57.235000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:03:57.749066 kubelet[1446]: E1213 02:03:57.749020    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:58.145842 systemd[1]: Created slice kubepods-besteffort-pod59f0a7f5_8486_488b_9fce_b28d042e294f.slice.
Dec 13 02:03:58.147517 env[1196]: time="2024-12-13T02:03:58.147480001Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xbcmp,Uid:59f0a7f5-8486-488b-9fce-b28d042e294f,Namespace:calico-system,Attempt:0,}"
Dec 13 02:03:58.234175 env[1196]: time="2024-12-13T02:03:58.234081650Z" level=error msg="Failed to destroy network for sandbox \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:03:58.234508 env[1196]: time="2024-12-13T02:03:58.234470429Z" level=error msg="encountered an error cleaning up failed sandbox \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:03:58.234552 env[1196]: time="2024-12-13T02:03:58.234526554Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xbcmp,Uid:59f0a7f5-8486-488b-9fce-b28d042e294f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:03:58.234834 kubelet[1446]: E1213 02:03:58.234781    1446 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:03:58.234898 kubelet[1446]: E1213 02:03:58.234870    1446 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xbcmp"
Dec 13 02:03:58.234934 kubelet[1446]: E1213 02:03:58.234895    1446 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xbcmp"
Dec 13 02:03:58.234981 kubelet[1446]: E1213 02:03:58.234940    1446 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xbcmp_calico-system(59f0a7f5-8486-488b-9fce-b28d042e294f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xbcmp_calico-system(59f0a7f5-8486-488b-9fce-b28d042e294f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xbcmp" podUID="59f0a7f5-8486-488b-9fce-b28d042e294f"
Dec 13 02:03:58.235563 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610-shm.mount: Deactivated successfully.
Dec 13 02:03:58.316072 kubelet[1446]: I1213 02:03:58.316012    1446 topology_manager.go:215] "Topology Admit Handler" podUID="36883c6e-4255-4cfe-a6bc-691d38fc69ee" podNamespace="default" podName="nginx-deployment-85f456d6dd-xcxrr"
Dec 13 02:03:58.320583 systemd[1]: Created slice kubepods-besteffort-pod36883c6e_4255_4cfe_a6bc_691d38fc69ee.slice.
Dec 13 02:03:58.373823 kubelet[1446]: I1213 02:03:58.373765    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g75cs\" (UniqueName: \"kubernetes.io/projected/36883c6e-4255-4cfe-a6bc-691d38fc69ee-kube-api-access-g75cs\") pod \"nginx-deployment-85f456d6dd-xcxrr\" (UID: \"36883c6e-4255-4cfe-a6bc-691d38fc69ee\") " pod="default/nginx-deployment-85f456d6dd-xcxrr"
Dec 13 02:03:58.623171 env[1196]: time="2024-12-13T02:03:58.623097714Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-xcxrr,Uid:36883c6e-4255-4cfe-a6bc-691d38fc69ee,Namespace:default,Attempt:0,}"
Dec 13 02:03:58.684896 env[1196]: time="2024-12-13T02:03:58.684822770Z" level=error msg="Failed to destroy network for sandbox \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:03:58.685225 env[1196]: time="2024-12-13T02:03:58.685193265Z" level=error msg="encountered an error cleaning up failed sandbox \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:03:58.685282 env[1196]: time="2024-12-13T02:03:58.685245282Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-xcxrr,Uid:36883c6e-4255-4cfe-a6bc-691d38fc69ee,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:03:58.685488 kubelet[1446]: E1213 02:03:58.685455    1446 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:03:58.685549 kubelet[1446]: E1213 02:03:58.685515    1446 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-xcxrr"
Dec 13 02:03:58.685549 kubelet[1446]: E1213 02:03:58.685531    1446 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-xcxrr"
Dec 13 02:03:58.685615 kubelet[1446]: E1213 02:03:58.685570    1446 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-xcxrr_default(36883c6e-4255-4cfe-a6bc-691d38fc69ee)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-xcxrr_default(36883c6e-4255-4cfe-a6bc-691d38fc69ee)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-xcxrr" podUID="36883c6e-4255-4cfe-a6bc-691d38fc69ee"
Dec 13 02:03:58.749644 kubelet[1446]: E1213 02:03:58.749599    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:03:59.173477 kubelet[1446]: I1213 02:03:59.173447    1446 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610"
Dec 13 02:03:59.173985 env[1196]: time="2024-12-13T02:03:59.173933808Z" level=info msg="StopPodSandbox for \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\""
Dec 13 02:03:59.175036 kubelet[1446]: I1213 02:03:59.174997    1446 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5"
Dec 13 02:03:59.175416 env[1196]: time="2024-12-13T02:03:59.175386933Z" level=info msg="StopPodSandbox for \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\""
Dec 13 02:03:59.182993 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5-shm.mount: Deactivated successfully.
Dec 13 02:03:59.280770 env[1196]: time="2024-12-13T02:03:59.280687790Z" level=error msg="StopPodSandbox for \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\" failed" error="failed to destroy network for sandbox \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:03:59.281034 kubelet[1446]: E1213 02:03:59.280975    1446 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610"
Dec 13 02:03:59.281219 kubelet[1446]: E1213 02:03:59.281026    1446 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610"}
Dec 13 02:03:59.281219 kubelet[1446]: E1213 02:03:59.281072    1446 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"59f0a7f5-8486-488b-9fce-b28d042e294f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Dec 13 02:03:59.281219 kubelet[1446]: E1213 02:03:59.281101    1446 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"59f0a7f5-8486-488b-9fce-b28d042e294f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xbcmp" podUID="59f0a7f5-8486-488b-9fce-b28d042e294f"
Dec 13 02:03:59.292411 env[1196]: time="2024-12-13T02:03:59.292346043Z" level=error msg="StopPodSandbox for \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\" failed" error="failed to destroy network for sandbox \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 02:03:59.292643 kubelet[1446]: E1213 02:03:59.292604    1446 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5"
Dec 13 02:03:59.292643 kubelet[1446]: E1213 02:03:59.292637    1446 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5"}
Dec 13 02:03:59.292643 kubelet[1446]: E1213 02:03:59.292659    1446 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"36883c6e-4255-4cfe-a6bc-691d38fc69ee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Dec 13 02:03:59.292908 kubelet[1446]: E1213 02:03:59.292680    1446 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"36883c6e-4255-4cfe-a6bc-691d38fc69ee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-xcxrr" podUID="36883c6e-4255-4cfe-a6bc-691d38fc69ee"
Dec 13 02:03:59.750613 kubelet[1446]: E1213 02:03:59.750543    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:00.738633 kubelet[1446]: E1213 02:04:00.738574    1446 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:00.751037 kubelet[1446]: E1213 02:04:00.750992    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:01.751803 kubelet[1446]: E1213 02:04:01.751706    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:02.752232 kubelet[1446]: E1213 02:04:02.752118    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:03.753207 kubelet[1446]: E1213 02:04:03.753140    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:04.753537 kubelet[1446]: E1213 02:04:04.753443    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:05.754362 kubelet[1446]: E1213 02:04:05.754295    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:05.859242 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount143786184.mount: Deactivated successfully.
Dec 13 02:04:06.755018 kubelet[1446]: E1213 02:04:06.754950    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:07.755995 kubelet[1446]: E1213 02:04:07.755924    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:08.109790 env[1196]: time="2024-12-13T02:04:08.109685276Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:08.112477 env[1196]: time="2024-12-13T02:04:08.112431186Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:08.114460 env[1196]: time="2024-12-13T02:04:08.114393308Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:08.116422 env[1196]: time="2024-12-13T02:04:08.116332876Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:08.116875 env[1196]: time="2024-12-13T02:04:08.116833172Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\""
Dec 13 02:04:08.146649 env[1196]: time="2024-12-13T02:04:08.146580887Z" level=info msg="CreateContainer within sandbox \"e7ae86ff4677035228cd89c24821d1ddd5f7248f95142f640346ef3409089a33\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}"
Dec 13 02:04:08.165651 env[1196]: time="2024-12-13T02:04:08.165539134Z" level=info msg="CreateContainer within sandbox \"e7ae86ff4677035228cd89c24821d1ddd5f7248f95142f640346ef3409089a33\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4ecdaa4bf5e95fe136ea775d593ce4b496c065ed02cd33c6a8e51994b6482e65\""
Dec 13 02:04:08.166255 env[1196]: time="2024-12-13T02:04:08.166198495Z" level=info msg="StartContainer for \"4ecdaa4bf5e95fe136ea775d593ce4b496c065ed02cd33c6a8e51994b6482e65\""
Dec 13 02:04:08.199674 systemd[1]: Started cri-containerd-4ecdaa4bf5e95fe136ea775d593ce4b496c065ed02cd33c6a8e51994b6482e65.scope.
Dec 13 02:04:08.233000 audit[2001]: AVC avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.235402 kernel: kauditd_printk_skb: 40 callbacks suppressed
Dec 13 02:04:08.235458 kernel: audit: type=1400 audit(1734055448.233:524): avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.233000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f063327ee48 items=0 ppid=1517 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:08.244222 kernel: audit: type=1300 audit(1734055448.233:524): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f063327ee48 items=0 ppid=1517 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:08.244271 kernel: audit: type=1327 audit(1734055448.233:524): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465636461613462663565393566653133366561373735643539336365
Dec 13 02:04:08.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465636461613462663565393566653133366561373735643539336365
Dec 13 02:04:08.233000 audit[2001]: AVC avc:  denied  { bpf } for  pid=2001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.252219 kernel: audit: type=1400 audit(1734055448.233:525): avc:  denied  { bpf } for  pid=2001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.252268 kernel: audit: type=1400 audit(1734055448.233:525): avc:  denied  { bpf } for  pid=2001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.233000 audit[2001]: AVC avc:  denied  { bpf } for  pid=2001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.255165 kernel: audit: type=1400 audit(1734055448.233:525): avc:  denied  { bpf } for  pid=2001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.233000 audit[2001]: AVC avc:  denied  { bpf } for  pid=2001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.233000 audit[2001]: AVC avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.261975 kernel: audit: type=1400 audit(1734055448.233:525): avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.262089 kernel: audit: type=1400 audit(1734055448.233:525): avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.233000 audit[2001]: AVC avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.265505 kernel: audit: type=1400 audit(1734055448.233:525): avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.233000 audit[2001]: AVC avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.268673 kernel: audit: type=1400 audit(1734055448.233:525): avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.233000 audit[2001]: AVC avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.233000 audit[2001]: AVC avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.233000 audit[2001]: AVC avc:  denied  { bpf } for  pid=2001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.233000 audit[2001]: AVC avc:  denied  { bpf } for  pid=2001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.233000 audit: BPF prog-id=78 op=LOAD
Dec 13 02:04:08.233000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003997a8 items=0 ppid=1517 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:08.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465636461613462663565393566653133366561373735643539336365
Dec 13 02:04:08.238000 audit[2001]: AVC avc:  denied  { bpf } for  pid=2001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.238000 audit[2001]: AVC avc:  denied  { bpf } for  pid=2001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.238000 audit[2001]: AVC avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.238000 audit[2001]: AVC avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.238000 audit[2001]: AVC avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.238000 audit[2001]: AVC avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.238000 audit[2001]: AVC avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.238000 audit[2001]: AVC avc:  denied  { bpf } for  pid=2001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.238000 audit[2001]: AVC avc:  denied  { bpf } for  pid=2001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.238000 audit: BPF prog-id=79 op=LOAD
Dec 13 02:04:08.238000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003997f8 items=0 ppid=1517 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:08.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465636461613462663565393566653133366561373735643539336365
Dec 13 02:04:08.248000 audit: BPF prog-id=79 op=UNLOAD
Dec 13 02:04:08.248000 audit: BPF prog-id=78 op=UNLOAD
Dec 13 02:04:08.248000 audit[2001]: AVC avc:  denied  { bpf } for  pid=2001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.248000 audit[2001]: AVC avc:  denied  { bpf } for  pid=2001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.248000 audit[2001]: AVC avc:  denied  { bpf } for  pid=2001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.248000 audit[2001]: AVC avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.248000 audit[2001]: AVC avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.248000 audit[2001]: AVC avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.248000 audit[2001]: AVC avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.248000 audit[2001]: AVC avc:  denied  { perfmon } for  pid=2001 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.248000 audit[2001]: AVC avc:  denied  { bpf } for  pid=2001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.248000 audit[2001]: AVC avc:  denied  { bpf } for  pid=2001 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:08.248000 audit: BPF prog-id=80 op=LOAD
Dec 13 02:04:08.248000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000399888 items=0 ppid=1517 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:08.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465636461613462663565393566653133366561373735643539336365
Dec 13 02:04:08.276996 env[1196]: time="2024-12-13T02:04:08.276941788Z" level=info msg="StartContainer for \"4ecdaa4bf5e95fe136ea775d593ce4b496c065ed02cd33c6a8e51994b6482e65\" returns successfully"
Dec 13 02:04:08.530777 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information.
Dec 13 02:04:08.530933 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
Dec 13 02:04:08.757050 kubelet[1446]: E1213 02:04:08.756994    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:09.195310 kubelet[1446]: E1213 02:04:09.195274    1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 02:04:09.266558 kubelet[1446]: I1213 02:04:09.266479    1446 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-lwsm5" podStartSLOduration=5.193216613 podStartE2EDuration="29.266459844s" podCreationTimestamp="2024-12-13 02:03:40 +0000 UTC" firstStartedPulling="2024-12-13 02:03:44.044444455 +0000 UTC m=+3.711440317" lastFinishedPulling="2024-12-13 02:04:08.117687686 +0000 UTC m=+27.784683548" observedRunningTime="2024-12-13 02:04:09.265723327 +0000 UTC m=+28.932719189" watchObservedRunningTime="2024-12-13 02:04:09.266459844 +0000 UTC m=+28.933455706"
Dec 13 02:04:09.758144 kubelet[1446]: E1213 02:04:09.758073    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:09.907000 audit[2126]: AVC avc:  denied  { write } for  pid=2126 comm="tee" name="fd" dev="proc" ino=17343 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 02:04:09.907000 audit[2126]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9f43ea25 a2=241 a3=1b6 items=1 ppid=2081 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:09.907000 audit: CWD cwd="/etc/service/enabled/confd/log"
Dec 13 02:04:09.907000 audit: PATH item=0 name="/dev/fd/63" inode=17339 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:04:09.907000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 02:04:09.908000 audit[2121]: AVC avc:  denied  { write } for  pid=2121 comm="tee" name="fd" dev="proc" ino=19343 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 02:04:09.908000 audit[2121]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff6853ba16 a2=241 a3=1b6 items=1 ppid=2076 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:09.908000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log"
Dec 13 02:04:09.908000 audit: PATH item=0 name="/dev/fd/63" inode=19746 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:04:09.908000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 02:04:09.908000 audit[2123]: AVC avc:  denied  { write } for  pid=2123 comm="tee" name="fd" dev="proc" ino=19347 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 02:04:09.908000 audit[2123]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd2c49a25 a2=241 a3=1b6 items=1 ppid=2068 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:09.908000 audit: CWD cwd="/etc/service/enabled/felix/log"
Dec 13 02:04:09.908000 audit: PATH item=0 name="/dev/fd/63" inode=19328 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:04:09.908000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 02:04:09.911000 audit[2139]: AVC avc:  denied  { write } for  pid=2139 comm="tee" name="fd" dev="proc" ino=17347 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 02:04:09.911000 audit[2139]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc007daa15 a2=241 a3=1b6 items=1 ppid=2085 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:09.911000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log"
Dec 13 02:04:09.911000 audit: PATH item=0 name="/dev/fd/63" inode=19340 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:04:09.911000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 02:04:09.912000 audit[2136]: AVC avc:  denied  { write } for  pid=2136 comm="tee" name="fd" dev="proc" ino=19351 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 02:04:09.912000 audit[2136]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe3cf04a27 a2=241 a3=1b6 items=1 ppid=2069 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:09.912000 audit: CWD cwd="/etc/service/enabled/cni/log"
Dec 13 02:04:09.912000 audit: PATH item=0 name="/dev/fd/63" inode=19337 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:04:09.912000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 02:04:09.916000 audit[2130]: AVC avc:  denied  { write } for  pid=2130 comm="tee" name="fd" dev="proc" ino=20553 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 02:04:09.916000 audit[2130]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdac3bba25 a2=241 a3=1b6 items=1 ppid=2079 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:09.916000 audit: CWD cwd="/etc/service/enabled/bird6/log"
Dec 13 02:04:09.916000 audit: PATH item=0 name="/dev/fd/63" inode=19751 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:04:09.916000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 02:04:09.919000 audit[2133]: AVC avc:  denied  { write } for  pid=2133 comm="tee" name="fd" dev="proc" ino=17351 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 02:04:09.919000 audit[2133]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff741e3a26 a2=241 a3=1b6 items=1 ppid=2070 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:09.919000 audit: CWD cwd="/etc/service/enabled/bird/log"
Dec 13 02:04:09.919000 audit: PATH item=0 name="/dev/fd/63" inode=19754 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:04:09.919000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 02:04:10.062000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.062000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.062000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.062000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.062000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.062000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.062000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.062000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.062000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.062000 audit: BPF prog-id=81 op=LOAD
Dec 13 02:04:10.062000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9a15a420 a2=98 a3=3 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.062000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.077000 audit: BPF prog-id=81 op=UNLOAD
Dec 13 02:04:10.077000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.077000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.077000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.077000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.077000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.077000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.077000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.077000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.077000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.077000 audit: BPF prog-id=82 op=LOAD
Dec 13 02:04:10.077000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9a15a200 a2=74 a3=540051 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.077000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.077000 audit: BPF prog-id=82 op=UNLOAD
Dec 13 02:04:10.077000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.077000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.077000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.077000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.077000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.077000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.077000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.077000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.077000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.077000 audit: BPF prog-id=83 op=LOAD
Dec 13 02:04:10.077000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9a15a230 a2=94 a3=2 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.077000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.077000 audit: BPF prog-id=83 op=UNLOAD
Dec 13 02:04:10.196000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.196000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.196000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.196000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.196000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.196000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.196000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.196000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.196000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.196000 audit: BPF prog-id=84 op=LOAD
Dec 13 02:04:10.196000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe9a15a0f0 a2=40 a3=1 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.196000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.196000 audit: BPF prog-id=84 op=UNLOAD
Dec 13 02:04:10.196000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.196000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe9a15a1c0 a2=50 a3=7ffe9a15a2a0 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.196000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9a15a100 a2=28 a3=0 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9a15a130 a2=28 a3=0 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9a15a040 a2=28 a3=0 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9a15a150 a2=28 a3=0 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9a15a130 a2=28 a3=0 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9a15a120 a2=28 a3=0 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9a15a150 a2=28 a3=0 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9a15a130 a2=28 a3=0 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9a15a150 a2=28 a3=0 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9a15a120 a2=28 a3=0 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe9a15a190 a2=28 a3=0 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe9a159f40 a2=50 a3=1 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit: BPF prog-id=85 op=LOAD
Dec 13 02:04:10.204000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe9a159f40 a2=94 a3=5 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.204000 audit: BPF prog-id=85 op=UNLOAD
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe9a159ff0 a2=50 a3=1 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe9a15a110 a2=4 a3=38 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { confidentiality } for  pid=2184 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:10.204000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9a15a160 a2=94 a3=6 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.204000 audit[2184]: AVC avc:  denied  { confidentiality } for  pid=2184 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:10.204000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9a159910 a2=94 a3=83 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.204000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.205000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.205000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.205000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.205000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.205000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.205000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.205000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.205000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.205000 audit[2184]: AVC avc:  denied  { perfmon } for  pid=2184 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.205000 audit[2184]: AVC avc:  denied  { bpf } for  pid=2184 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.205000 audit[2184]: AVC avc:  denied  { confidentiality } for  pid=2184 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:10.205000 audit[2184]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe9a159910 a2=94 a3=83 items=0 ppid=2072 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.205000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit: BPF prog-id=86 op=LOAD
Dec 13 02:04:10.211000 audit[2188]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd0c07a8d0 a2=98 a3=1999999999999999 items=0 ppid=2072 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.211000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F
Dec 13 02:04:10.211000 audit: BPF prog-id=86 op=UNLOAD
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit: BPF prog-id=87 op=LOAD
Dec 13 02:04:10.211000 audit[2188]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd0c07a7b0 a2=74 a3=ffff items=0 ppid=2072 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.211000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F
Dec 13 02:04:10.211000 audit: BPF prog-id=87 op=UNLOAD
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { perfmon } for  pid=2188 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit[2188]: AVC avc:  denied  { bpf } for  pid=2188 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.211000 audit: BPF prog-id=88 op=LOAD
Dec 13 02:04:10.211000 audit[2188]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd0c07a7f0 a2=40 a3=7ffd0c07a9d0 items=0 ppid=2072 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.211000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F
Dec 13 02:04:10.212000 audit: BPF prog-id=88 op=UNLOAD
Dec 13 02:04:10.253534 systemd-networkd[1026]: vxlan.calico: Link UP
Dec 13 02:04:10.253541 systemd-networkd[1026]: vxlan.calico: Gained carrier
Dec 13 02:04:10.265000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.265000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.265000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.265000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.265000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.265000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.265000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.265000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.265000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.265000 audit: BPF prog-id=89 op=LOAD
Dec 13 02:04:10.265000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebf6aa230 a2=98 a3=ffffffff items=0 ppid=2072 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.265000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:04:10.265000 audit: BPF prog-id=89 op=UNLOAD
Dec 13 02:04:10.265000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.265000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.265000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.265000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.265000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.265000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.265000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.265000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.265000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.265000 audit: BPF prog-id=90 op=LOAD
Dec 13 02:04:10.265000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebf6aa040 a2=74 a3=540051 items=0 ppid=2072 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.265000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:04:10.266000 audit: BPF prog-id=90 op=UNLOAD
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit: BPF prog-id=91 op=LOAD
Dec 13 02:04:10.266000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebf6aa070 a2=94 a3=2 items=0 ppid=2072 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:04:10.266000 audit: BPF prog-id=91 op=UNLOAD
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffebf6a9f40 a2=28 a3=0 items=0 ppid=2072 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebf6a9f70 a2=28 a3=0 items=0 ppid=2072 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebf6a9e80 a2=28 a3=0 items=0 ppid=2072 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffebf6a9f90 a2=28 a3=0 items=0 ppid=2072 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffebf6a9f70 a2=28 a3=0 items=0 ppid=2072 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffebf6a9f60 a2=28 a3=0 items=0 ppid=2072 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffebf6a9f90 a2=28 a3=0 items=0 ppid=2072 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebf6a9f70 a2=28 a3=0 items=0 ppid=2072 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebf6a9f90 a2=28 a3=0 items=0 ppid=2072 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebf6a9f60 a2=28 a3=0 items=0 ppid=2072 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffebf6a9fd0 a2=28 a3=0 items=0 ppid=2072 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.266000 audit: BPF prog-id=92 op=LOAD
Dec 13 02:04:10.266000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffebf6a9e40 a2=40 a3=0 items=0 ppid=2072 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.266000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:04:10.266000 audit: BPF prog-id=92 op=UNLOAD
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffebf6a9e30 a2=50 a3=2800 items=0 ppid=2072 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.267000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffebf6a9e30 a2=50 a3=2800 items=0 ppid=2072 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.267000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit: BPF prog-id=93 op=LOAD
Dec 13 02:04:10.267000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffebf6a9650 a2=94 a3=2 items=0 ppid=2072 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.267000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:04:10.267000 audit: BPF prog-id=93 op=UNLOAD
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { perfmon } for  pid=2218 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit[2218]: AVC avc:  denied  { bpf } for  pid=2218 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.267000 audit: BPF prog-id=94 op=LOAD
Dec 13 02:04:10.267000 audit[2218]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffebf6a9750 a2=94 a3=2d items=0 ppid=2072 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.267000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 02:04:10.269000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.269000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.269000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.269000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.269000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.269000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.269000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.269000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.269000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.269000 audit: BPF prog-id=95 op=LOAD
Dec 13 02:04:10.269000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8348ed60 a2=98 a3=0 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.269000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.269000 audit: BPF prog-id=95 op=UNLOAD
Dec 13 02:04:10.270000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.270000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.270000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.270000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.270000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.270000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.270000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.270000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.270000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.270000 audit: BPF prog-id=96 op=LOAD
Dec 13 02:04:10.270000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc8348eb40 a2=74 a3=540051 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.270000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.270000 audit: BPF prog-id=96 op=UNLOAD
Dec 13 02:04:10.270000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.270000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.270000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.270000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.270000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.270000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.270000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.270000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.270000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.270000 audit: BPF prog-id=97 op=LOAD
Dec 13 02:04:10.270000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc8348eb70 a2=94 a3=2 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.270000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.270000 audit: BPF prog-id=97 op=UNLOAD
Dec 13 02:04:10.390000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.390000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.390000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.390000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.390000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.390000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.390000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.390000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.390000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.390000 audit: BPF prog-id=98 op=LOAD
Dec 13 02:04:10.390000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc8348ea30 a2=40 a3=1 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.390000 audit: BPF prog-id=98 op=UNLOAD
Dec 13 02:04:10.390000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.390000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc8348eb00 a2=50 a3=7ffc8348ebe0 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.390000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.397000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.397000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8348ea40 a2=28 a3=0 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.397000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.397000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8348ea70 a2=28 a3=0 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.397000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.397000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8348e980 a2=28 a3=0 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.397000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.397000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8348ea90 a2=28 a3=0 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.397000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.397000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8348ea70 a2=28 a3=0 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.397000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.397000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8348ea60 a2=28 a3=0 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.397000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.397000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8348ea90 a2=28 a3=0 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.397000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.397000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8348ea70 a2=28 a3=0 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.397000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.397000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8348ea90 a2=28 a3=0 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.397000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.397000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8348ea60 a2=28 a3=0 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.397000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.397000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8348ead0 a2=28 a3=0 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.397000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc8348e880 a2=50 a3=1 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.398000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit: BPF prog-id=99 op=LOAD
Dec 13 02:04:10.398000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc8348e880 a2=94 a3=5 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.398000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.398000 audit: BPF prog-id=99 op=UNLOAD
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc8348e930 a2=50 a3=1 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.398000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc8348ea50 a2=4 a3=38 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.398000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { confidentiality } for  pid=2220 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:10.398000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc8348eaa0 a2=94 a3=6 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.398000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { confidentiality } for  pid=2220 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:10.398000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc8348e250 a2=94 a3=83 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.398000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { perfmon } for  pid=2220 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.398000 audit[2220]: AVC avc:  denied  { confidentiality } for  pid=2220 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:10.398000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc8348e250 a2=94 a3=83 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.398000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.399000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.399000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8348fc90 a2=10 a3=208 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.399000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.399000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.399000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8348fb30 a2=10 a3=3 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.399000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.399000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.399000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8348fad0 a2=10 a3=3 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.399000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.399000 audit[2220]: AVC avc:  denied  { bpf } for  pid=2220 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:10.399000 audit[2220]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc8348fad0 a2=10 a3=7 items=0 ppid=2072 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.399000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 02:04:10.406000 audit: BPF prog-id=94 op=UNLOAD
Dec 13 02:04:10.443000 audit[2249]: NETFILTER_CFG table=mangle:67 family=2 entries=16 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 02:04:10.443000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffcbccddf00 a2=0 a3=7ffcbccddeec items=0 ppid=2072 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.443000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 02:04:10.448000 audit[2248]: NETFILTER_CFG table=nat:68 family=2 entries=15 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 02:04:10.448000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fffe4a649d0 a2=0 a3=7fffe4a649bc items=0 ppid=2072 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.448000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 02:04:10.449000 audit[2251]: NETFILTER_CFG table=filter:69 family=2 entries=39 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 02:04:10.449000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd1d937150 a2=0 a3=7ffd1d93713c items=0 ppid=2072 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.449000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 02:04:10.452000 audit[2247]: NETFILTER_CFG table=raw:70 family=2 entries=21 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 02:04:10.452000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffcbdabeea0 a2=0 a3=7ffcbdabee8c items=0 ppid=2072 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:10.452000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 02:04:10.758291 kubelet[1446]: E1213 02:04:10.758158    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:11.759254 kubelet[1446]: E1213 02:04:11.759176    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:12.142637 env[1196]: time="2024-12-13T02:04:12.142568956Z" level=info msg="StopPodSandbox for \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\""
Dec 13 02:04:12.264989 env[1196]: 2024-12-13 02:04:12.233 [INFO][2276] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610"
Dec 13 02:04:12.264989 env[1196]: 2024-12-13 02:04:12.233 [INFO][2276] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" iface="eth0" netns="/var/run/netns/cni-e9fda540-0e71-589c-2d73-b85c05574287"
Dec 13 02:04:12.264989 env[1196]: 2024-12-13 02:04:12.233 [INFO][2276] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" iface="eth0" netns="/var/run/netns/cni-e9fda540-0e71-589c-2d73-b85c05574287"
Dec 13 02:04:12.264989 env[1196]: 2024-12-13 02:04:12.233 [INFO][2276] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone.  Nothing to do. ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" iface="eth0" netns="/var/run/netns/cni-e9fda540-0e71-589c-2d73-b85c05574287"
Dec 13 02:04:12.264989 env[1196]: 2024-12-13 02:04:12.233 [INFO][2276] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610"
Dec 13 02:04:12.264989 env[1196]: 2024-12-13 02:04:12.233 [INFO][2276] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610"
Dec 13 02:04:12.264989 env[1196]: 2024-12-13 02:04:12.253 [INFO][2284] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" HandleID="k8s-pod-network.1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" Workload="10.0.0.101-k8s-csi--node--driver--xbcmp-eth0"
Dec 13 02:04:12.264989 env[1196]: 2024-12-13 02:04:12.253 [INFO][2284] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:04:12.264989 env[1196]: 2024-12-13 02:04:12.253 [INFO][2284] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:04:12.264989 env[1196]: 2024-12-13 02:04:12.259 [WARNING][2284] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" HandleID="k8s-pod-network.1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" Workload="10.0.0.101-k8s-csi--node--driver--xbcmp-eth0"
Dec 13 02:04:12.264989 env[1196]: 2024-12-13 02:04:12.259 [INFO][2284] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" HandleID="k8s-pod-network.1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" Workload="10.0.0.101-k8s-csi--node--driver--xbcmp-eth0"
Dec 13 02:04:12.264989 env[1196]: 2024-12-13 02:04:12.261 [INFO][2284] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:04:12.264989 env[1196]: 2024-12-13 02:04:12.263 [INFO][2276] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610"
Dec 13 02:04:12.265671 env[1196]: time="2024-12-13T02:04:12.265194697Z" level=info msg="TearDown network for sandbox \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\" successfully"
Dec 13 02:04:12.265671 env[1196]: time="2024-12-13T02:04:12.265230686Z" level=info msg="StopPodSandbox for \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\" returns successfully"
Dec 13 02:04:12.266440 env[1196]: time="2024-12-13T02:04:12.266402597Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xbcmp,Uid:59f0a7f5-8486-488b-9fce-b28d042e294f,Namespace:calico-system,Attempt:1,}"
Dec 13 02:04:12.266664 systemd[1]: run-netns-cni\x2de9fda540\x2d0e71\x2d589c\x2d2d73\x2db85c05574287.mount: Deactivated successfully.
Dec 13 02:04:12.273938 systemd-networkd[1026]: vxlan.calico: Gained IPv6LL
Dec 13 02:04:12.688402 kubelet[1446]: I1213 02:04:12.688348    1446 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness"
Dec 13 02:04:12.689983 kubelet[1446]: E1213 02:04:12.689415    1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 02:04:12.759809 kubelet[1446]: E1213 02:04:12.759772    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:12.798119 systemd-networkd[1026]: calif2d12061c20: Link UP
Dec 13 02:04:12.800537 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Dec 13 02:04:12.800601 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif2d12061c20: link becomes ready
Dec 13 02:04:12.800841 systemd-networkd[1026]: calif2d12061c20: Gained carrier
Dec 13 02:04:12.812831 env[1196]: 2024-12-13 02:04:12.727 [INFO][2292] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.101-k8s-csi--node--driver--xbcmp-eth0 csi-node-driver- calico-system  59f0a7f5-8486-488b-9fce-b28d042e294f 956 0 2024-12-13 02:03:40 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s  10.0.0.101  csi-node-driver-xbcmp eth0 csi-node-driver [] []   [kns.calico-system ksa.calico-system.csi-node-driver] calif2d12061c20  [] []}} ContainerID="b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf" Namespace="calico-system" Pod="csi-node-driver-xbcmp" WorkloadEndpoint="10.0.0.101-k8s-csi--node--driver--xbcmp-"
Dec 13 02:04:12.812831 env[1196]: 2024-12-13 02:04:12.727 [INFO][2292] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf" Namespace="calico-system" Pod="csi-node-driver-xbcmp" WorkloadEndpoint="10.0.0.101-k8s-csi--node--driver--xbcmp-eth0"
Dec 13 02:04:12.812831 env[1196]: 2024-12-13 02:04:12.755 [INFO][2332] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf" HandleID="k8s-pod-network.b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf" Workload="10.0.0.101-k8s-csi--node--driver--xbcmp-eth0"
Dec 13 02:04:12.812831 env[1196]: 2024-12-13 02:04:12.766 [INFO][2332] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf" HandleID="k8s-pod-network.b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf" Workload="10.0.0.101-k8s-csi--node--driver--xbcmp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003150d0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.101", "pod":"csi-node-driver-xbcmp", "timestamp":"2024-12-13 02:04:12.755536224 +0000 UTC"}, Hostname:"10.0.0.101", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Dec 13 02:04:12.812831 env[1196]: 2024-12-13 02:04:12.766 [INFO][2332] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:04:12.812831 env[1196]: 2024-12-13 02:04:12.766 [INFO][2332] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:04:12.812831 env[1196]: 2024-12-13 02:04:12.766 [INFO][2332] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.101'
Dec 13 02:04:12.812831 env[1196]: 2024-12-13 02:04:12.769 [INFO][2332] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf" host="10.0.0.101"
Dec 13 02:04:12.812831 env[1196]: 2024-12-13 02:04:12.772 [INFO][2332] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.101"
Dec 13 02:04:12.812831 env[1196]: 2024-12-13 02:04:12.776 [INFO][2332] ipam/ipam.go 489: Trying affinity for 192.168.20.128/26 host="10.0.0.101"
Dec 13 02:04:12.812831 env[1196]: 2024-12-13 02:04:12.778 [INFO][2332] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.128/26 host="10.0.0.101"
Dec 13 02:04:12.812831 env[1196]: 2024-12-13 02:04:12.780 [INFO][2332] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.128/26 host="10.0.0.101"
Dec 13 02:04:12.812831 env[1196]: 2024-12-13 02:04:12.780 [INFO][2332] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.128/26 handle="k8s-pod-network.b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf" host="10.0.0.101"
Dec 13 02:04:12.812831 env[1196]: 2024-12-13 02:04:12.782 [INFO][2332] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf
Dec 13 02:04:12.812831 env[1196]: 2024-12-13 02:04:12.787 [INFO][2332] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.128/26 handle="k8s-pod-network.b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf" host="10.0.0.101"
Dec 13 02:04:12.812831 env[1196]: 2024-12-13 02:04:12.794 [INFO][2332] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.129/26] block=192.168.20.128/26 handle="k8s-pod-network.b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf" host="10.0.0.101"
Dec 13 02:04:12.812831 env[1196]: 2024-12-13 02:04:12.794 [INFO][2332] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.129/26] handle="k8s-pod-network.b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf" host="10.0.0.101"
Dec 13 02:04:12.812831 env[1196]: 2024-12-13 02:04:12.794 [INFO][2332] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:04:12.812831 env[1196]: 2024-12-13 02:04:12.794 [INFO][2332] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.129/26] IPv6=[] ContainerID="b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf" HandleID="k8s-pod-network.b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf" Workload="10.0.0.101-k8s-csi--node--driver--xbcmp-eth0"
Dec 13 02:04:12.813428 env[1196]: 2024-12-13 02:04:12.796 [INFO][2292] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf" Namespace="calico-system" Pod="csi-node-driver-xbcmp" WorkloadEndpoint="10.0.0.101-k8s-csi--node--driver--xbcmp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.101-k8s-csi--node--driver--xbcmp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"59f0a7f5-8486-488b-9fce-b28d042e294f", ResourceVersion:"956", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 40, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.101", ContainerID:"", Pod:"csi-node-driver-xbcmp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.20.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif2d12061c20", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:04:12.813428 env[1196]: 2024-12-13 02:04:12.796 [INFO][2292] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.129/32] ContainerID="b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf" Namespace="calico-system" Pod="csi-node-driver-xbcmp" WorkloadEndpoint="10.0.0.101-k8s-csi--node--driver--xbcmp-eth0"
Dec 13 02:04:12.813428 env[1196]: 2024-12-13 02:04:12.796 [INFO][2292] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif2d12061c20 ContainerID="b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf" Namespace="calico-system" Pod="csi-node-driver-xbcmp" WorkloadEndpoint="10.0.0.101-k8s-csi--node--driver--xbcmp-eth0"
Dec 13 02:04:12.813428 env[1196]: 2024-12-13 02:04:12.800 [INFO][2292] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf" Namespace="calico-system" Pod="csi-node-driver-xbcmp" WorkloadEndpoint="10.0.0.101-k8s-csi--node--driver--xbcmp-eth0"
Dec 13 02:04:12.813428 env[1196]: 2024-12-13 02:04:12.801 [INFO][2292] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf" Namespace="calico-system" Pod="csi-node-driver-xbcmp" WorkloadEndpoint="10.0.0.101-k8s-csi--node--driver--xbcmp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.101-k8s-csi--node--driver--xbcmp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"59f0a7f5-8486-488b-9fce-b28d042e294f", ResourceVersion:"956", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 40, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.101", ContainerID:"b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf", Pod:"csi-node-driver-xbcmp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.20.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif2d12061c20", MAC:"76:6f:9b:99:4e:b7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:04:12.813428 env[1196]: 2024-12-13 02:04:12.811 [INFO][2292] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf" Namespace="calico-system" Pod="csi-node-driver-xbcmp" WorkloadEndpoint="10.0.0.101-k8s-csi--node--driver--xbcmp-eth0"
Dec 13 02:04:12.819000 audit[2378]: NETFILTER_CFG table=filter:71 family=2 entries=34 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 02:04:12.819000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fffcd487ca0 a2=0 a3=7fffcd487c8c items=0 ppid=2072 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:12.819000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 02:04:12.822920 env[1196]: time="2024-12-13T02:04:12.822850724Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:04:12.822920 env[1196]: time="2024-12-13T02:04:12.822885881Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:04:12.822920 env[1196]: time="2024-12-13T02:04:12.822897553Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:04:12.823266 env[1196]: time="2024-12-13T02:04:12.823017602Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf pid=2382 runtime=io.containerd.runc.v2
Dec 13 02:04:12.832230 systemd[1]: Started cri-containerd-b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf.scope.
Dec 13 02:04:12.841000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.841000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.841000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.841000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.841000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.841000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.841000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.841000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.841000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.841000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.841000 audit: BPF prog-id=100 op=LOAD
Dec 13 02:04:12.841000 audit[2391]: AVC avc:  denied  { bpf } for  pid=2391 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.841000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2382 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:12.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232643731373138363063383134663862353631363133323638323931
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { perfmon } for  pid=2391 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2382 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:12.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232643731373138363063383134663862353631363133323638323931
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { bpf } for  pid=2391 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { bpf } for  pid=2391 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { bpf } for  pid=2391 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { perfmon } for  pid=2391 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { perfmon } for  pid=2391 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { perfmon } for  pid=2391 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { perfmon } for  pid=2391 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { perfmon } for  pid=2391 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { bpf } for  pid=2391 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { bpf } for  pid=2391 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit: BPF prog-id=101 op=LOAD
Dec 13 02:04:12.842000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00031ebf0 items=0 ppid=2382 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:12.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232643731373138363063383134663862353631363133323638323931
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { bpf } for  pid=2391 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { bpf } for  pid=2391 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { perfmon } for  pid=2391 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { perfmon } for  pid=2391 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { perfmon } for  pid=2391 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { perfmon } for  pid=2391 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { perfmon } for  pid=2391 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { bpf } for  pid=2391 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { bpf } for  pid=2391 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit: BPF prog-id=102 op=LOAD
Dec 13 02:04:12.842000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00031ec38 items=0 ppid=2382 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:12.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232643731373138363063383134663862353631363133323638323931
Dec 13 02:04:12.842000 audit: BPF prog-id=102 op=UNLOAD
Dec 13 02:04:12.842000 audit: BPF prog-id=101 op=UNLOAD
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { bpf } for  pid=2391 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { bpf } for  pid=2391 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { bpf } for  pid=2391 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { perfmon } for  pid=2391 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { perfmon } for  pid=2391 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { perfmon } for  pid=2391 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { perfmon } for  pid=2391 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { perfmon } for  pid=2391 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { bpf } for  pid=2391 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit[2391]: AVC avc:  denied  { bpf } for  pid=2391 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:12.842000 audit: BPF prog-id=103 op=LOAD
Dec 13 02:04:12.842000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00031f048 items=0 ppid=2382 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:12.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232643731373138363063383134663862353631363133323638323931
Dec 13 02:04:12.844506 systemd-resolved[1137]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address
Dec 13 02:04:12.853738 env[1196]: time="2024-12-13T02:04:12.853699748Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xbcmp,Uid:59f0a7f5-8486-488b-9fce-b28d042e294f,Namespace:calico-system,Attempt:1,} returns sandbox id \"b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf\""
Dec 13 02:04:12.855251 env[1196]: time="2024-12-13T02:04:12.855224651Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\""
Dec 13 02:04:13.142926 env[1196]: time="2024-12-13T02:04:13.142867470Z" level=info msg="StopPodSandbox for \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\""
Dec 13 02:04:13.209829 env[1196]: 2024-12-13 02:04:13.180 [INFO][2432] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5"
Dec 13 02:04:13.209829 env[1196]: 2024-12-13 02:04:13.180 [INFO][2432] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" iface="eth0" netns="/var/run/netns/cni-55f96942-744c-34d3-f91d-0aae0bf03bbb"
Dec 13 02:04:13.209829 env[1196]: 2024-12-13 02:04:13.180 [INFO][2432] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" iface="eth0" netns="/var/run/netns/cni-55f96942-744c-34d3-f91d-0aae0bf03bbb"
Dec 13 02:04:13.209829 env[1196]: 2024-12-13 02:04:13.180 [INFO][2432] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone.  Nothing to do. ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" iface="eth0" netns="/var/run/netns/cni-55f96942-744c-34d3-f91d-0aae0bf03bbb"
Dec 13 02:04:13.209829 env[1196]: 2024-12-13 02:04:13.180 [INFO][2432] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5"
Dec 13 02:04:13.209829 env[1196]: 2024-12-13 02:04:13.180 [INFO][2432] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5"
Dec 13 02:04:13.209829 env[1196]: 2024-12-13 02:04:13.199 [INFO][2440] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" HandleID="k8s-pod-network.3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" Workload="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0"
Dec 13 02:04:13.209829 env[1196]: 2024-12-13 02:04:13.199 [INFO][2440] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:04:13.209829 env[1196]: 2024-12-13 02:04:13.199 [INFO][2440] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:04:13.209829 env[1196]: 2024-12-13 02:04:13.205 [WARNING][2440] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" HandleID="k8s-pod-network.3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" Workload="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0"
Dec 13 02:04:13.209829 env[1196]: 2024-12-13 02:04:13.205 [INFO][2440] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" HandleID="k8s-pod-network.3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" Workload="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0"
Dec 13 02:04:13.209829 env[1196]: 2024-12-13 02:04:13.207 [INFO][2440] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:04:13.209829 env[1196]: 2024-12-13 02:04:13.208 [INFO][2432] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5"
Dec 13 02:04:13.210241 env[1196]: time="2024-12-13T02:04:13.209972553Z" level=info msg="TearDown network for sandbox \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\" successfully"
Dec 13 02:04:13.210241 env[1196]: time="2024-12-13T02:04:13.210011176Z" level=info msg="StopPodSandbox for \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\" returns successfully"
Dec 13 02:04:13.210536 env[1196]: time="2024-12-13T02:04:13.210512731Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-xcxrr,Uid:36883c6e-4255-4cfe-a6bc-691d38fc69ee,Namespace:default,Attempt:1,}"
Dec 13 02:04:13.269193 systemd[1]: run-containerd-runc-k8s.io-4ecdaa4bf5e95fe136ea775d593ce4b496c065ed02cd33c6a8e51994b6482e65-runc.GmsDzs.mount: Deactivated successfully.
Dec 13 02:04:13.269288 systemd[1]: run-netns-cni\x2d55f96942\x2d744c\x2d34d3\x2df91d\x2d0aae0bf03bbb.mount: Deactivated successfully.
Dec 13 02:04:13.325299 systemd-networkd[1026]: calieaa57dde9f8: Link UP
Dec 13 02:04:13.327077 systemd-networkd[1026]: calieaa57dde9f8: Gained carrier
Dec 13 02:04:13.327777 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calieaa57dde9f8: link becomes ready
Dec 13 02:04:13.335386 env[1196]: 2024-12-13 02:04:13.257 [INFO][2448] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0 nginx-deployment-85f456d6dd- default  36883c6e-4255-4cfe-a6bc-691d38fc69ee 966 0 2024-12-13 02:03:58 +0000 UTC <nil> <nil> map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s  10.0.0.101  nginx-deployment-85f456d6dd-xcxrr eth0 default [] []   [kns.default ksa.default.default] calieaa57dde9f8  [] []}} ContainerID="dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8" Namespace="default" Pod="nginx-deployment-85f456d6dd-xcxrr" WorkloadEndpoint="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-"
Dec 13 02:04:13.335386 env[1196]: 2024-12-13 02:04:13.257 [INFO][2448] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8" Namespace="default" Pod="nginx-deployment-85f456d6dd-xcxrr" WorkloadEndpoint="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0"
Dec 13 02:04:13.335386 env[1196]: 2024-12-13 02:04:13.289 [INFO][2461] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8" HandleID="k8s-pod-network.dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8" Workload="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0"
Dec 13 02:04:13.335386 env[1196]: 2024-12-13 02:04:13.300 [INFO][2461] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8" HandleID="k8s-pod-network.dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8" Workload="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dd060), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.101", "pod":"nginx-deployment-85f456d6dd-xcxrr", "timestamp":"2024-12-13 02:04:13.289023416 +0000 UTC"}, Hostname:"10.0.0.101", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Dec 13 02:04:13.335386 env[1196]: 2024-12-13 02:04:13.300 [INFO][2461] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:04:13.335386 env[1196]: 2024-12-13 02:04:13.300 [INFO][2461] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:04:13.335386 env[1196]: 2024-12-13 02:04:13.300 [INFO][2461] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.101'
Dec 13 02:04:13.335386 env[1196]: 2024-12-13 02:04:13.302 [INFO][2461] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8" host="10.0.0.101"
Dec 13 02:04:13.335386 env[1196]: 2024-12-13 02:04:13.305 [INFO][2461] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.101"
Dec 13 02:04:13.335386 env[1196]: 2024-12-13 02:04:13.309 [INFO][2461] ipam/ipam.go 489: Trying affinity for 192.168.20.128/26 host="10.0.0.101"
Dec 13 02:04:13.335386 env[1196]: 2024-12-13 02:04:13.310 [INFO][2461] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.128/26 host="10.0.0.101"
Dec 13 02:04:13.335386 env[1196]: 2024-12-13 02:04:13.312 [INFO][2461] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.128/26 host="10.0.0.101"
Dec 13 02:04:13.335386 env[1196]: 2024-12-13 02:04:13.312 [INFO][2461] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.128/26 handle="k8s-pod-network.dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8" host="10.0.0.101"
Dec 13 02:04:13.335386 env[1196]: 2024-12-13 02:04:13.313 [INFO][2461] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8
Dec 13 02:04:13.335386 env[1196]: 2024-12-13 02:04:13.316 [INFO][2461] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.128/26 handle="k8s-pod-network.dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8" host="10.0.0.101"
Dec 13 02:04:13.335386 env[1196]: 2024-12-13 02:04:13.321 [INFO][2461] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.130/26] block=192.168.20.128/26 handle="k8s-pod-network.dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8" host="10.0.0.101"
Dec 13 02:04:13.335386 env[1196]: 2024-12-13 02:04:13.322 [INFO][2461] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.130/26] handle="k8s-pod-network.dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8" host="10.0.0.101"
Dec 13 02:04:13.335386 env[1196]: 2024-12-13 02:04:13.322 [INFO][2461] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:04:13.335386 env[1196]: 2024-12-13 02:04:13.322 [INFO][2461] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.130/26] IPv6=[] ContainerID="dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8" HandleID="k8s-pod-network.dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8" Workload="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0"
Dec 13 02:04:13.335908 env[1196]: 2024-12-13 02:04:13.323 [INFO][2448] cni-plugin/k8s.go 386: Populated endpoint ContainerID="dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8" Namespace="default" Pod="nginx-deployment-85f456d6dd-xcxrr" WorkloadEndpoint="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"36883c6e-4255-4cfe-a6bc-691d38fc69ee", ResourceVersion:"966", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.101", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-xcxrr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calieaa57dde9f8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:04:13.335908 env[1196]: 2024-12-13 02:04:13.323 [INFO][2448] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.130/32] ContainerID="dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8" Namespace="default" Pod="nginx-deployment-85f456d6dd-xcxrr" WorkloadEndpoint="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0"
Dec 13 02:04:13.335908 env[1196]: 2024-12-13 02:04:13.323 [INFO][2448] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calieaa57dde9f8 ContainerID="dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8" Namespace="default" Pod="nginx-deployment-85f456d6dd-xcxrr" WorkloadEndpoint="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0"
Dec 13 02:04:13.335908 env[1196]: 2024-12-13 02:04:13.327 [INFO][2448] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8" Namespace="default" Pod="nginx-deployment-85f456d6dd-xcxrr" WorkloadEndpoint="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0"
Dec 13 02:04:13.335908 env[1196]: 2024-12-13 02:04:13.327 [INFO][2448] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8" Namespace="default" Pod="nginx-deployment-85f456d6dd-xcxrr" WorkloadEndpoint="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"36883c6e-4255-4cfe-a6bc-691d38fc69ee", ResourceVersion:"966", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.101", ContainerID:"dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8", Pod:"nginx-deployment-85f456d6dd-xcxrr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calieaa57dde9f8", MAC:"96:cb:67:a7:a2:2b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:04:13.335908 env[1196]: 2024-12-13 02:04:13.333 [INFO][2448] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8" Namespace="default" Pod="nginx-deployment-85f456d6dd-xcxrr" WorkloadEndpoint="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0"
Dec 13 02:04:13.341000 audit[2481]: NETFILTER_CFG table=filter:72 family=2 entries=38 op=nft_register_chain pid=2481 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 02:04:13.352323 kernel: kauditd_printk_skb: 608 callbacks suppressed
Dec 13 02:04:13.352403 kernel: audit: type=1325 audit(1734055453.341:651): table=filter:72 family=2 entries=38 op=nft_register_chain pid=2481 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 02:04:13.352432 kernel: audit: type=1300 audit(1734055453.341:651): arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffef33e6a30 a2=0 a3=7ffef33e6a1c items=0 ppid=2072 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:13.341000 audit[2481]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffef33e6a30 a2=0 a3=7ffef33e6a1c items=0 ppid=2072 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:13.352551 env[1196]: time="2024-12-13T02:04:13.348845046Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:04:13.352551 env[1196]: time="2024-12-13T02:04:13.348896464Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:04:13.352551 env[1196]: time="2024-12-13T02:04:13.348910782Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:04:13.352551 env[1196]: time="2024-12-13T02:04:13.349067750Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8 pid=2489 runtime=io.containerd.runc.v2
Dec 13 02:04:13.355878 kernel: audit: type=1327 audit(1734055453.341:651): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 02:04:13.341000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 02:04:13.366437 systemd[1]: Started cri-containerd-dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8.scope.
Dec 13 02:04:13.379769 kernel: audit: type=1400 audit(1734055453.371:652): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.379855 kernel: audit: type=1400 audit(1734055453.372:653): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.379871 kernel: audit: type=1400 audit(1734055453.372:654): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.371000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.372000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.372000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.372000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.386073 kernel: audit: type=1400 audit(1734055453.372:655): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.386130 kernel: audit: type=1400 audit(1734055453.372:656): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.372000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.389491 kernel: audit: type=1400 audit(1734055453.372:657): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.372000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.372000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.392654 systemd-resolved[1137]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address
Dec 13 02:04:13.395729 kernel: audit: type=1400 audit(1734055453.372:658): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.372000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.372000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.377000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.377000 audit: BPF prog-id=104 op=LOAD
Dec 13 02:04:13.378000 audit[2499]: AVC avc:  denied  { bpf } for  pid=2499 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.378000 audit[2499]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2489 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:13.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463393663303335326631626131373466326333663831396365353665
Dec 13 02:04:13.378000 audit[2499]: AVC avc:  denied  { perfmon } for  pid=2499 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.378000 audit[2499]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2489 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:13.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463393663303335326631626131373466326333663831396365353665
Dec 13 02:04:13.378000 audit[2499]: AVC avc:  denied  { bpf } for  pid=2499 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.378000 audit[2499]: AVC avc:  denied  { bpf } for  pid=2499 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.378000 audit[2499]: AVC avc:  denied  { bpf } for  pid=2499 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.378000 audit[2499]: AVC avc:  denied  { perfmon } for  pid=2499 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.378000 audit[2499]: AVC avc:  denied  { perfmon } for  pid=2499 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.378000 audit[2499]: AVC avc:  denied  { perfmon } for  pid=2499 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.378000 audit[2499]: AVC avc:  denied  { perfmon } for  pid=2499 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.378000 audit[2499]: AVC avc:  denied  { perfmon } for  pid=2499 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.378000 audit[2499]: AVC avc:  denied  { bpf } for  pid=2499 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.378000 audit[2499]: AVC avc:  denied  { bpf } for  pid=2499 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.378000 audit: BPF prog-id=105 op=LOAD
Dec 13 02:04:13.378000 audit[2499]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000218d20 items=0 ppid=2489 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:13.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463393663303335326631626131373466326333663831396365353665
Dec 13 02:04:13.381000 audit[2499]: AVC avc:  denied  { bpf } for  pid=2499 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.381000 audit[2499]: AVC avc:  denied  { bpf } for  pid=2499 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.381000 audit[2499]: AVC avc:  denied  { perfmon } for  pid=2499 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.381000 audit[2499]: AVC avc:  denied  { perfmon } for  pid=2499 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.381000 audit[2499]: AVC avc:  denied  { perfmon } for  pid=2499 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.381000 audit[2499]: AVC avc:  denied  { perfmon } for  pid=2499 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.381000 audit[2499]: AVC avc:  denied  { perfmon } for  pid=2499 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.381000 audit[2499]: AVC avc:  denied  { bpf } for  pid=2499 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.381000 audit[2499]: AVC avc:  denied  { bpf } for  pid=2499 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.381000 audit: BPF prog-id=106 op=LOAD
Dec 13 02:04:13.381000 audit[2499]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000218d68 items=0 ppid=2489 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:13.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463393663303335326631626131373466326333663831396365353665
Dec 13 02:04:13.384000 audit: BPF prog-id=106 op=UNLOAD
Dec 13 02:04:13.384000 audit: BPF prog-id=105 op=UNLOAD
Dec 13 02:04:13.384000 audit[2499]: AVC avc:  denied  { bpf } for  pid=2499 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.384000 audit[2499]: AVC avc:  denied  { bpf } for  pid=2499 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.384000 audit[2499]: AVC avc:  denied  { bpf } for  pid=2499 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.384000 audit[2499]: AVC avc:  denied  { perfmon } for  pid=2499 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.384000 audit[2499]: AVC avc:  denied  { perfmon } for  pid=2499 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.384000 audit[2499]: AVC avc:  denied  { perfmon } for  pid=2499 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.384000 audit[2499]: AVC avc:  denied  { perfmon } for  pid=2499 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.384000 audit[2499]: AVC avc:  denied  { perfmon } for  pid=2499 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.384000 audit[2499]: AVC avc:  denied  { bpf } for  pid=2499 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.384000 audit[2499]: AVC avc:  denied  { bpf } for  pid=2499 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:13.384000 audit: BPF prog-id=107 op=LOAD
Dec 13 02:04:13.384000 audit[2499]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000219178 items=0 ppid=2489 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:13.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463393663303335326631626131373466326333663831396365353665
Dec 13 02:04:13.417957 env[1196]: time="2024-12-13T02:04:13.417900609Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-xcxrr,Uid:36883c6e-4255-4cfe-a6bc-691d38fc69ee,Namespace:default,Attempt:1,} returns sandbox id \"dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8\""
Dec 13 02:04:13.536060 update_engine[1191]: I1213 02:04:13.536003  1191 update_attempter.cc:509] Updating boot flags...
Dec 13 02:04:13.760385 kubelet[1446]: E1213 02:04:13.760239    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:14.233767 env[1196]: time="2024-12-13T02:04:14.233708070Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:14.235717 env[1196]: time="2024-12-13T02:04:14.235664989Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:14.237683 env[1196]: time="2024-12-13T02:04:14.237657265Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:14.239359 env[1196]: time="2024-12-13T02:04:14.239333470Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:14.239779 env[1196]: time="2024-12-13T02:04:14.239746235Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\""
Dec 13 02:04:14.240736 env[1196]: time="2024-12-13T02:04:14.240651374Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\""
Dec 13 02:04:14.241414 env[1196]: time="2024-12-13T02:04:14.241394286Z" level=info msg="CreateContainer within sandbox \"b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}"
Dec 13 02:04:14.255568 env[1196]: time="2024-12-13T02:04:14.255533523Z" level=info msg="CreateContainer within sandbox \"b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"ccba36b39d7633035f0305070788f305e34b407ac9b1fb9dbb78f1fc4ef41c17\""
Dec 13 02:04:14.255918 env[1196]: time="2024-12-13T02:04:14.255891874Z" level=info msg="StartContainer for \"ccba36b39d7633035f0305070788f305e34b407ac9b1fb9dbb78f1fc4ef41c17\""
Dec 13 02:04:14.271852 systemd[1]: Started cri-containerd-ccba36b39d7633035f0305070788f305e34b407ac9b1fb9dbb78f1fc4ef41c17.scope.
Dec 13 02:04:14.281000 audit[2537]: AVC avc:  denied  { perfmon } for  pid=2537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.281000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f82206c6cb8 items=0 ppid=2382 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:14.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363626133366233396437363333303335663033303530373037383866
Dec 13 02:04:14.281000 audit[2537]: AVC avc:  denied  { bpf } for  pid=2537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.281000 audit[2537]: AVC avc:  denied  { bpf } for  pid=2537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.281000 audit[2537]: AVC avc:  denied  { bpf } for  pid=2537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.281000 audit[2537]: AVC avc:  denied  { perfmon } for  pid=2537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.281000 audit[2537]: AVC avc:  denied  { perfmon } for  pid=2537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.281000 audit[2537]: AVC avc:  denied  { perfmon } for  pid=2537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.281000 audit[2537]: AVC avc:  denied  { perfmon } for  pid=2537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.281000 audit[2537]: AVC avc:  denied  { perfmon } for  pid=2537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.281000 audit[2537]: AVC avc:  denied  { bpf } for  pid=2537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.281000 audit[2537]: AVC avc:  denied  { bpf } for  pid=2537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.281000 audit: BPF prog-id=108 op=LOAD
Dec 13 02:04:14.281000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b4738 items=0 ppid=2382 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:14.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363626133366233396437363333303335663033303530373037383866
Dec 13 02:04:14.282000 audit[2537]: AVC avc:  denied  { bpf } for  pid=2537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.282000 audit[2537]: AVC avc:  denied  { bpf } for  pid=2537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.282000 audit[2537]: AVC avc:  denied  { perfmon } for  pid=2537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.282000 audit[2537]: AVC avc:  denied  { perfmon } for  pid=2537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.282000 audit[2537]: AVC avc:  denied  { perfmon } for  pid=2537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.282000 audit[2537]: AVC avc:  denied  { perfmon } for  pid=2537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.282000 audit[2537]: AVC avc:  denied  { perfmon } for  pid=2537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.282000 audit[2537]: AVC avc:  denied  { bpf } for  pid=2537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.282000 audit[2537]: AVC avc:  denied  { bpf } for  pid=2537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.282000 audit: BPF prog-id=109 op=LOAD
Dec 13 02:04:14.282000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b4788 items=0 ppid=2382 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:14.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363626133366233396437363333303335663033303530373037383866
Dec 13 02:04:14.282000 audit: BPF prog-id=109 op=UNLOAD
Dec 13 02:04:14.282000 audit: BPF prog-id=108 op=UNLOAD
Dec 13 02:04:14.282000 audit[2537]: AVC avc:  denied  { bpf } for  pid=2537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.282000 audit[2537]: AVC avc:  denied  { bpf } for  pid=2537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.282000 audit[2537]: AVC avc:  denied  { bpf } for  pid=2537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.282000 audit[2537]: AVC avc:  denied  { perfmon } for  pid=2537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.282000 audit[2537]: AVC avc:  denied  { perfmon } for  pid=2537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.282000 audit[2537]: AVC avc:  denied  { perfmon } for  pid=2537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.282000 audit[2537]: AVC avc:  denied  { perfmon } for  pid=2537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.282000 audit[2537]: AVC avc:  denied  { perfmon } for  pid=2537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.282000 audit[2537]: AVC avc:  denied  { bpf } for  pid=2537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.282000 audit[2537]: AVC avc:  denied  { bpf } for  pid=2537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:14.282000 audit: BPF prog-id=110 op=LOAD
Dec 13 02:04:14.282000 audit[2537]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b4818 items=0 ppid=2382 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:14.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363626133366233396437363333303335663033303530373037383866
Dec 13 02:04:14.295026 env[1196]: time="2024-12-13T02:04:14.294966853Z" level=info msg="StartContainer for \"ccba36b39d7633035f0305070788f305e34b407ac9b1fb9dbb78f1fc4ef41c17\" returns successfully"
Dec 13 02:04:14.641892 systemd-networkd[1026]: calif2d12061c20: Gained IPv6LL
Dec 13 02:04:14.760581 kubelet[1446]: E1213 02:04:14.760537    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:15.048000 audit[2566]: NETFILTER_CFG table=filter:73 family=2 entries=16 op=nft_register_rule pid=2566 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:15.048000 audit[2566]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd4f76e730 a2=0 a3=7ffd4f76e71c items=0 ppid=1666 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:15.048000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:15.058000 audit[2566]: NETFILTER_CFG table=nat:74 family=2 entries=14 op=nft_register_rule pid=2566 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:15.058000 audit[2566]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd4f76e730 a2=0 a3=0 items=0 ppid=1666 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:15.058000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:15.218015 systemd-networkd[1026]: calieaa57dde9f8: Gained IPv6LL
Dec 13 02:04:15.760972 kubelet[1446]: E1213 02:04:15.760911    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:16.762010 kubelet[1446]: E1213 02:04:16.761915    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:17.762714 kubelet[1446]: E1213 02:04:17.762605    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:18.049000 audit[2576]: NETFILTER_CFG table=filter:75 family=2 entries=16 op=nft_register_rule pid=2576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:18.049000 audit[2576]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd98aefa30 a2=0 a3=7ffd98aefa1c items=0 ppid=1666 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:18.049000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:18.054000 audit[2576]: NETFILTER_CFG table=nat:76 family=2 entries=14 op=nft_register_rule pid=2576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:18.054000 audit[2576]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd98aefa30 a2=0 a3=0 items=0 ppid=1666 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:18.054000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:18.340834 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1225433728.mount: Deactivated successfully.
Dec 13 02:04:18.763609 kubelet[1446]: E1213 02:04:18.763468    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:19.763799 kubelet[1446]: E1213 02:04:19.763728    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:20.684115 env[1196]: time="2024-12-13T02:04:20.684058662Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:20.685978 env[1196]: time="2024-12-13T02:04:20.685950572Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:20.688139 env[1196]: time="2024-12-13T02:04:20.688103436Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:20.689758 env[1196]: time="2024-12-13T02:04:20.689717890Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:20.690354 env[1196]: time="2024-12-13T02:04:20.690329728Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\""
Dec 13 02:04:20.691570 env[1196]: time="2024-12-13T02:04:20.691535791Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\""
Dec 13 02:04:20.692379 env[1196]: time="2024-12-13T02:04:20.692354570Z" level=info msg="CreateContainer within sandbox \"dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8\" for container &ContainerMetadata{Name:nginx,Attempt:0,}"
Dec 13 02:04:20.704514 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3353836070.mount: Deactivated successfully.
Dec 13 02:04:20.705540 env[1196]: time="2024-12-13T02:04:20.705498621Z" level=info msg="CreateContainer within sandbox \"dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"3057080a079ea29db5a8f8b5686601c9e8cf21285f1cc3fae5ca91808b3c39bd\""
Dec 13 02:04:20.705972 env[1196]: time="2024-12-13T02:04:20.705946949Z" level=info msg="StartContainer for \"3057080a079ea29db5a8f8b5686601c9e8cf21285f1cc3fae5ca91808b3c39bd\""
Dec 13 02:04:20.720690 systemd[1]: Started cri-containerd-3057080a079ea29db5a8f8b5686601c9e8cf21285f1cc3fae5ca91808b3c39bd.scope.
Dec 13 02:04:20.745093 kernel: kauditd_printk_skb: 105 callbacks suppressed
Dec 13 02:04:20.745259 kernel: audit: type=1400 audit(1734055460.730:680): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.745302 kernel: audit: type=1400 audit(1734055460.730:681): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.745354 kernel: audit: type=1400 audit(1734055460.730:682): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.745379 kernel: audit: type=1400 audit(1734055460.730:683): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.745397 kernel: audit: type=1400 audit(1734055460.730:684): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.730000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.730000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.730000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.730000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.730000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.745644 kubelet[1446]: E1213 02:04:20.744919    1446 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:20.730000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.751182 kernel: audit: type=1400 audit(1734055460.730:685): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.751252 kernel: audit: type=1400 audit(1734055460.730:686): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.730000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.730000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.757535 kernel: audit: type=1400 audit(1734055460.730:687): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.757615 kernel: audit: type=1400 audit(1734055460.730:688): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.730000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.764117 kernel: audit: type=1400 audit(1734055460.734:689): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.734000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.734000 audit: BPF prog-id=111 op=LOAD
Dec 13 02:04:20.734000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.734000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2489 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:20.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353730383061303739656132396462356138663862353638363630
Dec 13 02:04:20.734000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.734000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2489 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:20.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353730383061303739656132396462356138663862353638363630
Dec 13 02:04:20.734000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.734000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.734000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.734000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.734000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.734000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.734000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.734000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.734000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.734000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.734000 audit: BPF prog-id=112 op=LOAD
Dec 13 02:04:20.734000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001af9f0 items=0 ppid=2489 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:20.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353730383061303739656132396462356138663862353638363630
Dec 13 02:04:20.737000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.737000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.737000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.737000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.737000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.737000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.737000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.737000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.737000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.737000 audit: BPF prog-id=113 op=LOAD
Dec 13 02:04:20.737000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001afa38 items=0 ppid=2489 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:20.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353730383061303739656132396462356138663862353638363630
Dec 13 02:04:20.741000 audit: BPF prog-id=113 op=UNLOAD
Dec 13 02:04:20.741000 audit: BPF prog-id=112 op=UNLOAD
Dec 13 02:04:20.741000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.741000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.741000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.741000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.741000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.741000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.741000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.741000 audit[2592]: AVC avc:  denied  { perfmon } for  pid=2592 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.741000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.741000 audit[2592]: AVC avc:  denied  { bpf } for  pid=2592 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:20.741000 audit: BPF prog-id=114 op=LOAD
Dec 13 02:04:20.741000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0001afe48 items=0 ppid=2489 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:20.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330353730383061303739656132396462356138663862353638363630
Dec 13 02:04:20.766302 kubelet[1446]: E1213 02:04:20.765826    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:20.778428 env[1196]: time="2024-12-13T02:04:20.778376020Z" level=info msg="StartContainer for \"3057080a079ea29db5a8f8b5686601c9e8cf21285f1cc3fae5ca91808b3c39bd\" returns successfully"
Dec 13 02:04:21.280000 audit[2641]: NETFILTER_CFG table=filter:77 family=2 entries=16 op=nft_register_rule pid=2641 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:21.280000 audit[2641]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdad21d0c0 a2=0 a3=7ffdad21d0ac items=0 ppid=1666 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:21.280000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:21.285000 audit[2641]: NETFILTER_CFG table=nat:78 family=2 entries=14 op=nft_register_rule pid=2641 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:21.285000 audit[2641]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffdad21d0c0 a2=0 a3=0 items=0 ppid=1666 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:21.285000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:21.766953 kubelet[1446]: E1213 02:04:21.766910    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:22.056000 audit[2643]: NETFILTER_CFG table=filter:79 family=2 entries=13 op=nft_register_rule pid=2643 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:22.056000 audit[2643]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd77d2e4e0 a2=0 a3=7ffd77d2e4cc items=0 ppid=1666 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:22.056000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:22.062000 audit[2643]: NETFILTER_CFG table=nat:80 family=2 entries=35 op=nft_register_chain pid=2643 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:22.062000 audit[2643]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd77d2e4e0 a2=0 a3=7ffd77d2e4cc items=0 ppid=1666 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:22.062000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:22.663503 env[1196]: time="2024-12-13T02:04:22.663433854Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:22.665579 env[1196]: time="2024-12-13T02:04:22.665536058Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:22.672400 env[1196]: time="2024-12-13T02:04:22.672194313Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:22.768069 kubelet[1446]: E1213 02:04:22.768018    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:23.522826 env[1196]: time="2024-12-13T02:04:23.522721759Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:23.523039 env[1196]: time="2024-12-13T02:04:23.522978144Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\""
Dec 13 02:04:23.527371 env[1196]: time="2024-12-13T02:04:23.527257187Z" level=info msg="CreateContainer within sandbox \"b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}"
Dec 13 02:04:23.577692 env[1196]: time="2024-12-13T02:04:23.577579789Z" level=info msg="CreateContainer within sandbox \"b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"74502fc6434d37828a5f3ce5a5f27a3f8f52c48811132ae12a7400e3273a9f88\""
Dec 13 02:04:23.578918 env[1196]: time="2024-12-13T02:04:23.578859367Z" level=info msg="StartContainer for \"74502fc6434d37828a5f3ce5a5f27a3f8f52c48811132ae12a7400e3273a9f88\""
Dec 13 02:04:23.602289 systemd[1]: Started cri-containerd-74502fc6434d37828a5f3ce5a5f27a3f8f52c48811132ae12a7400e3273a9f88.scope.
Dec 13 02:04:23.614000 audit[2656]: AVC avc:  denied  { perfmon } for  pid=2656 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.614000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fa9c5dca3e8 items=0 ppid=2382 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:23.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734353032666336343334643337383238613566336365356135663237
Dec 13 02:04:23.614000 audit[2656]: AVC avc:  denied  { bpf } for  pid=2656 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.614000 audit[2656]: AVC avc:  denied  { bpf } for  pid=2656 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.614000 audit[2656]: AVC avc:  denied  { bpf } for  pid=2656 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.614000 audit[2656]: AVC avc:  denied  { perfmon } for  pid=2656 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.614000 audit[2656]: AVC avc:  denied  { perfmon } for  pid=2656 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.614000 audit[2656]: AVC avc:  denied  { perfmon } for  pid=2656 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.614000 audit[2656]: AVC avc:  denied  { perfmon } for  pid=2656 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.614000 audit[2656]: AVC avc:  denied  { perfmon } for  pid=2656 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.614000 audit[2656]: AVC avc:  denied  { bpf } for  pid=2656 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.614000 audit[2656]: AVC avc:  denied  { bpf } for  pid=2656 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.614000 audit: BPF prog-id=115 op=LOAD
Dec 13 02:04:23.614000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00028b688 items=0 ppid=2382 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:23.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734353032666336343334643337383238613566336365356135663237
Dec 13 02:04:23.616000 audit[2656]: AVC avc:  denied  { bpf } for  pid=2656 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.616000 audit[2656]: AVC avc:  denied  { bpf } for  pid=2656 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.616000 audit[2656]: AVC avc:  denied  { perfmon } for  pid=2656 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.616000 audit[2656]: AVC avc:  denied  { perfmon } for  pid=2656 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.616000 audit[2656]: AVC avc:  denied  { perfmon } for  pid=2656 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.616000 audit[2656]: AVC avc:  denied  { perfmon } for  pid=2656 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.616000 audit[2656]: AVC avc:  denied  { perfmon } for  pid=2656 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.616000 audit[2656]: AVC avc:  denied  { bpf } for  pid=2656 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.616000 audit[2656]: AVC avc:  denied  { bpf } for  pid=2656 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.616000 audit: BPF prog-id=116 op=LOAD
Dec 13 02:04:23.616000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00028b6d8 items=0 ppid=2382 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:23.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734353032666336343334643337383238613566336365356135663237
Dec 13 02:04:23.616000 audit: BPF prog-id=116 op=UNLOAD
Dec 13 02:04:23.616000 audit: BPF prog-id=115 op=UNLOAD
Dec 13 02:04:23.616000 audit[2656]: AVC avc:  denied  { bpf } for  pid=2656 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.616000 audit[2656]: AVC avc:  denied  { bpf } for  pid=2656 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.616000 audit[2656]: AVC avc:  denied  { bpf } for  pid=2656 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.616000 audit[2656]: AVC avc:  denied  { perfmon } for  pid=2656 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.616000 audit[2656]: AVC avc:  denied  { perfmon } for  pid=2656 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.616000 audit[2656]: AVC avc:  denied  { perfmon } for  pid=2656 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.616000 audit[2656]: AVC avc:  denied  { perfmon } for  pid=2656 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.616000 audit[2656]: AVC avc:  denied  { perfmon } for  pid=2656 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.616000 audit[2656]: AVC avc:  denied  { bpf } for  pid=2656 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.616000 audit[2656]: AVC avc:  denied  { bpf } for  pid=2656 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:23.616000 audit: BPF prog-id=117 op=LOAD
Dec 13 02:04:23.616000 audit[2656]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00028b768 items=0 ppid=2382 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:23.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734353032666336343334643337383238613566336365356135663237
Dec 13 02:04:23.633210 env[1196]: time="2024-12-13T02:04:23.633133273Z" level=info msg="StartContainer for \"74502fc6434d37828a5f3ce5a5f27a3f8f52c48811132ae12a7400e3273a9f88\" returns successfully"
Dec 13 02:04:23.769030 kubelet[1446]: E1213 02:04:23.768947    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:24.067000 audit[2687]: NETFILTER_CFG table=filter:81 family=2 entries=10 op=nft_register_rule pid=2687 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:24.067000 audit[2687]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe64c0d4c0 a2=0 a3=7ffe64c0d4ac items=0 ppid=1666 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:24.067000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:24.072000 audit[2687]: NETFILTER_CFG table=nat:82 family=2 entries=44 op=nft_register_rule pid=2687 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:24.072000 audit[2687]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe64c0d4c0 a2=0 a3=7ffe64c0d4ac items=0 ppid=1666 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:24.072000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:24.122440 kubelet[1446]: I1213 02:04:24.122411    1446 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0
Dec 13 02:04:24.122440 kubelet[1446]: I1213 02:04:24.122439    1446 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock
Dec 13 02:04:24.237538 kubelet[1446]: I1213 02:04:24.237483    1446 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-xbcmp" podStartSLOduration=33.567441047 podStartE2EDuration="44.237467008s" podCreationTimestamp="2024-12-13 02:03:40 +0000 UTC" firstStartedPulling="2024-12-13 02:04:12.854803259 +0000 UTC m=+32.521799111" lastFinishedPulling="2024-12-13 02:04:23.52482921 +0000 UTC m=+43.191825072" observedRunningTime="2024-12-13 02:04:24.237238627 +0000 UTC m=+43.904234509" watchObservedRunningTime="2024-12-13 02:04:24.237467008 +0000 UTC m=+43.904462870"
Dec 13 02:04:24.237740 kubelet[1446]: I1213 02:04:24.237619    1446 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-xcxrr" podStartSLOduration=18.965410106 podStartE2EDuration="26.237612834s" podCreationTimestamp="2024-12-13 02:03:58 +0000 UTC" firstStartedPulling="2024-12-13 02:04:13.419171687 +0000 UTC m=+33.086167549" lastFinishedPulling="2024-12-13 02:04:20.691374405 +0000 UTC m=+40.358370277" observedRunningTime="2024-12-13 02:04:21.454025762 +0000 UTC m=+41.121021624" watchObservedRunningTime="2024-12-13 02:04:24.237612834 +0000 UTC m=+43.904608696"
Dec 13 02:04:24.771579 kubelet[1446]: E1213 02:04:24.771510    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:24.774000 audit[2690]: NETFILTER_CFG table=filter:83 family=2 entries=10 op=nft_register_rule pid=2690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:24.774000 audit[2690]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd96fcd780 a2=0 a3=7ffd96fcd76c items=0 ppid=1666 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:24.774000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:24.800000 audit[2690]: NETFILTER_CFG table=nat:84 family=2 entries=56 op=nft_register_chain pid=2690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:24.800000 audit[2690]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd96fcd780 a2=0 a3=7ffd96fcd76c items=0 ppid=1666 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:24.800000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:25.772701 kubelet[1446]: E1213 02:04:25.772615    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:26.773193 kubelet[1446]: E1213 02:04:26.773128    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:27.074574 kernel: kauditd_printk_skb: 114 callbacks suppressed
Dec 13 02:04:27.074730 kernel: audit: type=1325 audit(1734055467.070:712): table=filter:85 family=2 entries=22 op=nft_register_rule pid=2693 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:27.070000 audit[2693]: NETFILTER_CFG table=filter:85 family=2 entries=22 op=nft_register_rule pid=2693 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:27.070000 audit[2693]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7fff1186c320 a2=0 a3=7fff1186c30c items=0 ppid=1666 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:27.080012 kernel: audit: type=1300 audit(1734055467.070:712): arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7fff1186c320 a2=0 a3=7fff1186c30c items=0 ppid=1666 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:27.080145 kernel: audit: type=1327 audit(1734055467.070:712): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:27.070000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:27.083000 audit[2693]: NETFILTER_CFG table=nat:86 family=2 entries=20 op=nft_register_rule pid=2693 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:27.083000 audit[2693]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff1186c320 a2=0 a3=0 items=0 ppid=1666 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:27.092541 kernel: audit: type=1325 audit(1734055467.083:713): table=nat:86 family=2 entries=20 op=nft_register_rule pid=2693 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:27.092590 kernel: audit: type=1300 audit(1734055467.083:713): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff1186c320 a2=0 a3=0 items=0 ppid=1666 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:27.092609 kernel: audit: type=1327 audit(1734055467.083:713): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:27.083000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:27.102000 audit[2695]: NETFILTER_CFG table=filter:87 family=2 entries=34 op=nft_register_rule pid=2695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:27.102000 audit[2695]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffd22dc80b0 a2=0 a3=7ffd22dc809c items=0 ppid=1666 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:27.110834 kernel: audit: type=1325 audit(1734055467.102:714): table=filter:87 family=2 entries=34 op=nft_register_rule pid=2695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:27.110908 kernel: audit: type=1300 audit(1734055467.102:714): arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffd22dc80b0 a2=0 a3=7ffd22dc809c items=0 ppid=1666 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:27.110933 kernel: audit: type=1327 audit(1734055467.102:714): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:27.102000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:27.114000 audit[2695]: NETFILTER_CFG table=nat:88 family=2 entries=20 op=nft_register_rule pid=2695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:27.114000 audit[2695]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd22dc80b0 a2=0 a3=0 items=0 ppid=1666 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:27.114000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:27.118783 kernel: audit: type=1325 audit(1734055467.114:715): table=nat:88 family=2 entries=20 op=nft_register_rule pid=2695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:27.123619 kubelet[1446]: I1213 02:04:27.123535    1446 topology_manager.go:215] "Topology Admit Handler" podUID="f76235c8-f871-49d3-89b6-0d2d9919742d" podNamespace="default" podName="nfs-server-provisioner-0"
Dec 13 02:04:27.129173 systemd[1]: Created slice kubepods-besteffort-podf76235c8_f871_49d3_89b6_0d2d9919742d.slice.
Dec 13 02:04:27.296722 kubelet[1446]: I1213 02:04:27.296654    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/f76235c8-f871-49d3-89b6-0d2d9919742d-data\") pod \"nfs-server-provisioner-0\" (UID: \"f76235c8-f871-49d3-89b6-0d2d9919742d\") " pod="default/nfs-server-provisioner-0"
Dec 13 02:04:27.296722 kubelet[1446]: I1213 02:04:27.296719    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ljlp2\" (UniqueName: \"kubernetes.io/projected/f76235c8-f871-49d3-89b6-0d2d9919742d-kube-api-access-ljlp2\") pod \"nfs-server-provisioner-0\" (UID: \"f76235c8-f871-49d3-89b6-0d2d9919742d\") " pod="default/nfs-server-provisioner-0"
Dec 13 02:04:27.432187 env[1196]: time="2024-12-13T02:04:27.432082942Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f76235c8-f871-49d3-89b6-0d2d9919742d,Namespace:default,Attempt:0,}"
Dec 13 02:04:27.541370 systemd-networkd[1026]: cali60e51b789ff: Link UP
Dec 13 02:04:27.544262 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Dec 13 02:04:27.544432 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready
Dec 13 02:04:27.544411 systemd-networkd[1026]: cali60e51b789ff: Gained carrier
Dec 13 02:04:27.557036 env[1196]: 2024-12-13 02:04:27.475 [INFO][2698] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.101-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default  f76235c8-f871-49d3-89b6-0d2d9919742d 1102 0 2024-12-13 02:04:27 +0000 UTC <nil> <nil> map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s  10.0.0.101  nfs-server-provisioner-0 eth0 nfs-server-provisioner [] []   [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff  [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.101-k8s-nfs--server--provisioner--0-"
Dec 13 02:04:27.557036 env[1196]: 2024-12-13 02:04:27.475 [INFO][2698] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.101-k8s-nfs--server--provisioner--0-eth0"
Dec 13 02:04:27.557036 env[1196]: 2024-12-13 02:04:27.503 [INFO][2709] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472" HandleID="k8s-pod-network.24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472" Workload="10.0.0.101-k8s-nfs--server--provisioner--0-eth0"
Dec 13 02:04:27.557036 env[1196]: 2024-12-13 02:04:27.512 [INFO][2709] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472" HandleID="k8s-pod-network.24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472" Workload="10.0.0.101-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004ad390), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.101", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 02:04:27.50349949 +0000 UTC"}, Hostname:"10.0.0.101", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Dec 13 02:04:27.557036 env[1196]: 2024-12-13 02:04:27.512 [INFO][2709] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:04:27.557036 env[1196]: 2024-12-13 02:04:27.512 [INFO][2709] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:04:27.557036 env[1196]: 2024-12-13 02:04:27.512 [INFO][2709] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.101'
Dec 13 02:04:27.557036 env[1196]: 2024-12-13 02:04:27.514 [INFO][2709] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472" host="10.0.0.101"
Dec 13 02:04:27.557036 env[1196]: 2024-12-13 02:04:27.518 [INFO][2709] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.101"
Dec 13 02:04:27.557036 env[1196]: 2024-12-13 02:04:27.523 [INFO][2709] ipam/ipam.go 489: Trying affinity for 192.168.20.128/26 host="10.0.0.101"
Dec 13 02:04:27.557036 env[1196]: 2024-12-13 02:04:27.524 [INFO][2709] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.128/26 host="10.0.0.101"
Dec 13 02:04:27.557036 env[1196]: 2024-12-13 02:04:27.526 [INFO][2709] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.128/26 host="10.0.0.101"
Dec 13 02:04:27.557036 env[1196]: 2024-12-13 02:04:27.526 [INFO][2709] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.128/26 handle="k8s-pod-network.24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472" host="10.0.0.101"
Dec 13 02:04:27.557036 env[1196]: 2024-12-13 02:04:27.528 [INFO][2709] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472
Dec 13 02:04:27.557036 env[1196]: 2024-12-13 02:04:27.532 [INFO][2709] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.128/26 handle="k8s-pod-network.24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472" host="10.0.0.101"
Dec 13 02:04:27.557036 env[1196]: 2024-12-13 02:04:27.537 [INFO][2709] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.131/26] block=192.168.20.128/26 handle="k8s-pod-network.24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472" host="10.0.0.101"
Dec 13 02:04:27.557036 env[1196]: 2024-12-13 02:04:27.537 [INFO][2709] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.131/26] handle="k8s-pod-network.24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472" host="10.0.0.101"
Dec 13 02:04:27.557036 env[1196]: 2024-12-13 02:04:27.537 [INFO][2709] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:04:27.557036 env[1196]: 2024-12-13 02:04:27.537 [INFO][2709] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.131/26] IPv6=[] ContainerID="24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472" HandleID="k8s-pod-network.24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472" Workload="10.0.0.101-k8s-nfs--server--provisioner--0-eth0"
Dec 13 02:04:27.557666 env[1196]: 2024-12-13 02:04:27.539 [INFO][2698] cni-plugin/k8s.go 386: Populated endpoint ContainerID="24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.101-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.101-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f76235c8-f871-49d3-89b6-0d2d9919742d", ResourceVersion:"1102", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 27, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.101", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.20.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:04:27.557666 env[1196]: 2024-12-13 02:04:27.539 [INFO][2698] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.131/32] ContainerID="24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.101-k8s-nfs--server--provisioner--0-eth0"
Dec 13 02:04:27.557666 env[1196]: 2024-12-13 02:04:27.539 [INFO][2698] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.101-k8s-nfs--server--provisioner--0-eth0"
Dec 13 02:04:27.557666 env[1196]: 2024-12-13 02:04:27.544 [INFO][2698] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.101-k8s-nfs--server--provisioner--0-eth0"
Dec 13 02:04:27.557838 env[1196]: 2024-12-13 02:04:27.544 [INFO][2698] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.101-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.101-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f76235c8-f871-49d3-89b6-0d2d9919742d", ResourceVersion:"1102", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 27, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.101", ContainerID:"24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.20.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"1a:b0:6f:cd:ee:c0", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:04:27.557838 env[1196]: 2024-12-13 02:04:27.555 [INFO][2698] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.101-k8s-nfs--server--provisioner--0-eth0"
Dec 13 02:04:27.566000 audit[2732]: NETFILTER_CFG table=filter:89 family=2 entries=38 op=nft_register_chain pid=2732 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 02:04:27.566000 audit[2732]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7fff67eac980 a2=0 a3=7fff67eac96c items=0 ppid=2072 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:27.566000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 02:04:27.574172 env[1196]: time="2024-12-13T02:04:27.574089228Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:04:27.574172 env[1196]: time="2024-12-13T02:04:27.574130345Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:04:27.574172 env[1196]: time="2024-12-13T02:04:27.574142899Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:04:27.574322 env[1196]: time="2024-12-13T02:04:27.574279096Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472 pid=2741 runtime=io.containerd.runc.v2
Dec 13 02:04:27.590605 systemd[1]: Started cri-containerd-24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472.scope.
Dec 13 02:04:27.598000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.598000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.598000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.598000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.598000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.598000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.598000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.598000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.598000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.598000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.598000 audit: BPF prog-id=118 op=LOAD
Dec 13 02:04:27.599000 audit[2751]: AVC avc:  denied  { bpf } for  pid=2751 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.599000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2741 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:27.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234626164373332346133316138326233656165396663323131346336
Dec 13 02:04:27.599000 audit[2751]: AVC avc:  denied  { perfmon } for  pid=2751 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.599000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2741 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:27.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234626164373332346133316138326233656165396663323131346336
Dec 13 02:04:27.599000 audit[2751]: AVC avc:  denied  { bpf } for  pid=2751 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.599000 audit[2751]: AVC avc:  denied  { bpf } for  pid=2751 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.599000 audit[2751]: AVC avc:  denied  { bpf } for  pid=2751 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.599000 audit[2751]: AVC avc:  denied  { perfmon } for  pid=2751 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.599000 audit[2751]: AVC avc:  denied  { perfmon } for  pid=2751 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.599000 audit[2751]: AVC avc:  denied  { perfmon } for  pid=2751 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.599000 audit[2751]: AVC avc:  denied  { perfmon } for  pid=2751 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.599000 audit[2751]: AVC avc:  denied  { perfmon } for  pid=2751 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.599000 audit[2751]: AVC avc:  denied  { bpf } for  pid=2751 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.599000 audit[2751]: AVC avc:  denied  { bpf } for  pid=2751 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.599000 audit: BPF prog-id=119 op=LOAD
Dec 13 02:04:27.599000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002939b0 items=0 ppid=2741 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:27.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234626164373332346133316138326233656165396663323131346336
Dec 13 02:04:27.600000 audit[2751]: AVC avc:  denied  { bpf } for  pid=2751 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.600000 audit[2751]: AVC avc:  denied  { bpf } for  pid=2751 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.600000 audit[2751]: AVC avc:  denied  { perfmon } for  pid=2751 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.600000 audit[2751]: AVC avc:  denied  { perfmon } for  pid=2751 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.600000 audit[2751]: AVC avc:  denied  { perfmon } for  pid=2751 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.600000 audit[2751]: AVC avc:  denied  { perfmon } for  pid=2751 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.600000 audit[2751]: AVC avc:  denied  { perfmon } for  pid=2751 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.600000 audit[2751]: AVC avc:  denied  { bpf } for  pid=2751 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.600000 audit[2751]: AVC avc:  denied  { bpf } for  pid=2751 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.600000 audit: BPF prog-id=120 op=LOAD
Dec 13 02:04:27.600000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002939f8 items=0 ppid=2741 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:27.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234626164373332346133316138326233656165396663323131346336
Dec 13 02:04:27.601000 audit: BPF prog-id=120 op=UNLOAD
Dec 13 02:04:27.601000 audit: BPF prog-id=119 op=UNLOAD
Dec 13 02:04:27.601000 audit[2751]: AVC avc:  denied  { bpf } for  pid=2751 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.601000 audit[2751]: AVC avc:  denied  { bpf } for  pid=2751 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.601000 audit[2751]: AVC avc:  denied  { bpf } for  pid=2751 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.601000 audit[2751]: AVC avc:  denied  { perfmon } for  pid=2751 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.601000 audit[2751]: AVC avc:  denied  { perfmon } for  pid=2751 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.601000 audit[2751]: AVC avc:  denied  { perfmon } for  pid=2751 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.601000 audit[2751]: AVC avc:  denied  { perfmon } for  pid=2751 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.601000 audit[2751]: AVC avc:  denied  { perfmon } for  pid=2751 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.601000 audit[2751]: AVC avc:  denied  { bpf } for  pid=2751 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.601000 audit[2751]: AVC avc:  denied  { bpf } for  pid=2751 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:27.601000 audit: BPF prog-id=121 op=LOAD
Dec 13 02:04:27.601000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000293e08 items=0 ppid=2741 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:27.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234626164373332346133316138326233656165396663323131346336
Dec 13 02:04:27.603139 systemd-resolved[1137]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address
Dec 13 02:04:27.626061 env[1196]: time="2024-12-13T02:04:27.625990127Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f76235c8-f871-49d3-89b6-0d2d9919742d,Namespace:default,Attempt:0,} returns sandbox id \"24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472\""
Dec 13 02:04:27.627594 env[1196]: time="2024-12-13T02:04:27.627574445Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\""
Dec 13 02:04:27.773875 kubelet[1446]: E1213 02:04:27.773778    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:28.774296 kubelet[1446]: E1213 02:04:28.774243    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:28.913947 systemd-networkd[1026]: cali60e51b789ff: Gained IPv6LL
Dec 13 02:04:29.775467 kubelet[1446]: E1213 02:04:29.775341    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:30.630007 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount451030876.mount: Deactivated successfully.
Dec 13 02:04:30.776471 kubelet[1446]: E1213 02:04:30.776414    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:31.777458 kubelet[1446]: E1213 02:04:31.777387    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:32.778364 kubelet[1446]: E1213 02:04:32.778290    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:33.736125 env[1196]: time="2024-12-13T02:04:33.736049346Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:33.738400 env[1196]: time="2024-12-13T02:04:33.738342032Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:33.740500 env[1196]: time="2024-12-13T02:04:33.740440723Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:33.742398 env[1196]: time="2024-12-13T02:04:33.742347002Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:33.743129 env[1196]: time="2024-12-13T02:04:33.743093086Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\""
Dec 13 02:04:33.746424 env[1196]: time="2024-12-13T02:04:33.746378882Z" level=info msg="CreateContainer within sandbox \"24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}"
Dec 13 02:04:33.760233 env[1196]: time="2024-12-13T02:04:33.760164266Z" level=info msg="CreateContainer within sandbox \"24bad7324a31a82b3eae9fc2114c6cdef30f82eb146682d45ae85bd8b4808472\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"f74ae72613329876885c32e271072c203e1621c617d137854ea6d37221440a51\""
Dec 13 02:04:33.760738 env[1196]: time="2024-12-13T02:04:33.760692590Z" level=info msg="StartContainer for \"f74ae72613329876885c32e271072c203e1621c617d137854ea6d37221440a51\""
Dec 13 02:04:33.778609 systemd[1]: run-containerd-runc-k8s.io-f74ae72613329876885c32e271072c203e1621c617d137854ea6d37221440a51-runc.DrhT6Y.mount: Deactivated successfully.
Dec 13 02:04:33.780833 kubelet[1446]: E1213 02:04:33.779146    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:33.780316 systemd[1]: Started cri-containerd-f74ae72613329876885c32e271072c203e1621c617d137854ea6d37221440a51.scope.
Dec 13 02:04:33.792810 kernel: kauditd_printk_skb: 62 callbacks suppressed
Dec 13 02:04:33.792965 kernel: audit: type=1400 audit(1734055473.787:735): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.793007 kernel: audit: type=1400 audit(1734055473.787:736): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.787000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.787000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.795721 kernel: audit: type=1400 audit(1734055473.787:737): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.787000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.798689 kernel: audit: type=1400 audit(1734055473.787:738): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.787000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.801943 kernel: audit: type=1400 audit(1734055473.787:739): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.787000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.805011 kernel: audit: type=1400 audit(1734055473.787:740): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.787000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.808376 kernel: audit: type=1400 audit(1734055473.787:741): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.787000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.811421 kernel: audit: type=1400 audit(1734055473.787:742): avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.787000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.814640 kernel: audit: type=1400 audit(1734055473.787:743): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.787000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.817835 kernel: audit: type=1400 audit(1734055473.794:744): avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.794000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.794000 audit: BPF prog-id=122 op=LOAD
Dec 13 02:04:33.795000 audit[2792]: AVC avc:  denied  { bpf } for  pid=2792 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.795000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2741 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:33.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637346165373236313333323938373638383563333265323731303732
Dec 13 02:04:33.795000 audit[2792]: AVC avc:  denied  { perfmon } for  pid=2792 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.795000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2741 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:33.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637346165373236313333323938373638383563333265323731303732
Dec 13 02:04:33.795000 audit[2792]: AVC avc:  denied  { bpf } for  pid=2792 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.795000 audit[2792]: AVC avc:  denied  { bpf } for  pid=2792 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.795000 audit[2792]: AVC avc:  denied  { bpf } for  pid=2792 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.795000 audit[2792]: AVC avc:  denied  { perfmon } for  pid=2792 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.795000 audit[2792]: AVC avc:  denied  { perfmon } for  pid=2792 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.795000 audit[2792]: AVC avc:  denied  { perfmon } for  pid=2792 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.795000 audit[2792]: AVC avc:  denied  { perfmon } for  pid=2792 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.795000 audit[2792]: AVC avc:  denied  { perfmon } for  pid=2792 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.795000 audit[2792]: AVC avc:  denied  { bpf } for  pid=2792 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.795000 audit[2792]: AVC avc:  denied  { bpf } for  pid=2792 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.795000 audit: BPF prog-id=123 op=LOAD
Dec 13 02:04:33.795000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00026ec30 items=0 ppid=2741 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:33.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637346165373236313333323938373638383563333265323731303732
Dec 13 02:04:33.804000 audit[2792]: AVC avc:  denied  { bpf } for  pid=2792 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.804000 audit[2792]: AVC avc:  denied  { bpf } for  pid=2792 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.804000 audit[2792]: AVC avc:  denied  { perfmon } for  pid=2792 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.804000 audit[2792]: AVC avc:  denied  { perfmon } for  pid=2792 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.804000 audit[2792]: AVC avc:  denied  { perfmon } for  pid=2792 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.804000 audit[2792]: AVC avc:  denied  { perfmon } for  pid=2792 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.804000 audit[2792]: AVC avc:  denied  { perfmon } for  pid=2792 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.804000 audit[2792]: AVC avc:  denied  { bpf } for  pid=2792 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.804000 audit[2792]: AVC avc:  denied  { bpf } for  pid=2792 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.804000 audit: BPF prog-id=124 op=LOAD
Dec 13 02:04:33.804000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00026ec78 items=0 ppid=2741 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:33.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637346165373236313333323938373638383563333265323731303732
Dec 13 02:04:33.810000 audit: BPF prog-id=124 op=UNLOAD
Dec 13 02:04:33.810000 audit: BPF prog-id=123 op=UNLOAD
Dec 13 02:04:33.810000 audit[2792]: AVC avc:  denied  { bpf } for  pid=2792 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.810000 audit[2792]: AVC avc:  denied  { bpf } for  pid=2792 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.810000 audit[2792]: AVC avc:  denied  { bpf } for  pid=2792 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.810000 audit[2792]: AVC avc:  denied  { perfmon } for  pid=2792 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.810000 audit[2792]: AVC avc:  denied  { perfmon } for  pid=2792 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.810000 audit[2792]: AVC avc:  denied  { perfmon } for  pid=2792 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.810000 audit[2792]: AVC avc:  denied  { perfmon } for  pid=2792 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.810000 audit[2792]: AVC avc:  denied  { perfmon } for  pid=2792 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.810000 audit[2792]: AVC avc:  denied  { bpf } for  pid=2792 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.810000 audit[2792]: AVC avc:  denied  { bpf } for  pid=2792 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:33.810000 audit: BPF prog-id=125 op=LOAD
Dec 13 02:04:33.810000 audit[2792]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00026f088 items=0 ppid=2741 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:33.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637346165373236313333323938373638383563333265323731303732
Dec 13 02:04:33.835315 env[1196]: time="2024-12-13T02:04:33.832984199Z" level=info msg="StartContainer for \"f74ae72613329876885c32e271072c203e1621c617d137854ea6d37221440a51\" returns successfully"
Dec 13 02:04:33.878000 audit[2819]: AVC avc:  denied  { search } for  pid=2819 comm="rpcbind" name="crypto" dev="proc" ino=22333 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c931 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0
Dec 13 02:04:33.878000 audit[2819]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fad30d230c0 a2=0 a3=0 items=0 ppid=2803 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c931 key=(null)
Dec 13 02:04:33.878000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77
Dec 13 02:04:33.918000 audit[2824]: AVC avc:  denied  { search } for  pid=2824 comm="dbus-daemon" name="crypto" dev="proc" ino=22333 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c931 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0
Dec 13 02:04:33.918000 audit[2824]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fa6f74010c0 a2=0 a3=0 items=0 ppid=2803 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c931 key=(null)
Dec 13 02:04:33.918000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65
Dec 13 02:04:33.921000 audit[2825]: AVC avc:  denied  { watch } for  pid=2825 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538660 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c931 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c168,c931 tclass=dir permissive=0
Dec 13 02:04:33.921000 audit[2825]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55641d3ee940 a2=2c8 a3=7ffd40ddb14c items=0 ppid=2803 pid=2825 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c931 key=(null)
Dec 13 02:04:33.921000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65
Dec 13 02:04:33.924000 audit[2826]: AVC avc:  denied  { read } for  pid=2826 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23702 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c931 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0
Dec 13 02:04:33.924000 audit[2826]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fb37fa38320 a1=80000 a2=d a3=7fff1c961c50 items=0 ppid=2803 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c931 key=(null)
Dec 13 02:04:33.924000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66
Dec 13 02:04:33.925000 audit[2826]: AVC avc:  denied  { search } for  pid=2826 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22333 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c931 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0
Dec 13 02:04:33.925000 audit[2826]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb37ef8c0c0 a2=0 a3=0 items=0 ppid=2803 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c931 key=(null)
Dec 13 02:04:33.925000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66
Dec 13 02:04:34.389813 kubelet[1446]: I1213 02:04:34.389704    1446 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.272693257 podStartE2EDuration="7.389681416s" podCreationTimestamp="2024-12-13 02:04:27 +0000 UTC" firstStartedPulling="2024-12-13 02:04:27.627169632 +0000 UTC m=+47.294165494" lastFinishedPulling="2024-12-13 02:04:33.744157791 +0000 UTC m=+53.411153653" observedRunningTime="2024-12-13 02:04:34.389413141 +0000 UTC m=+54.056409003" watchObservedRunningTime="2024-12-13 02:04:34.389681416 +0000 UTC m=+54.056677308"
Dec 13 02:04:34.448000 audit[2843]: NETFILTER_CFG table=filter:90 family=2 entries=22 op=nft_register_rule pid=2843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:34.448000 audit[2843]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff1e2c8700 a2=0 a3=7fff1e2c86ec items=0 ppid=1666 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:34.448000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:34.457000 audit[2843]: NETFILTER_CFG table=nat:91 family=2 entries=104 op=nft_register_chain pid=2843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:34.457000 audit[2843]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7fff1e2c8700 a2=0 a3=7fff1e2c86ec items=0 ppid=1666 pid=2843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:34.457000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:34.780150 kubelet[1446]: E1213 02:04:34.780009    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:35.780260 kubelet[1446]: E1213 02:04:35.780180    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:36.780402 kubelet[1446]: E1213 02:04:36.780347    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:37.573000 audit[2846]: NETFILTER_CFG table=filter:92 family=2 entries=9 op=nft_register_rule pid=2846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:37.573000 audit[2846]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffa372acf0 a2=0 a3=7fffa372acdc items=0 ppid=1666 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:37.573000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:37.582000 audit[2846]: NETFILTER_CFG table=nat:93 family=2 entries=51 op=nft_register_chain pid=2846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:37.582000 audit[2846]: SYSCALL arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7fffa372acf0 a2=0 a3=7fffa372acdc items=0 ppid=1666 pid=2846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:37.582000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:37.781471 kubelet[1446]: E1213 02:04:37.781388    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:38.781782 kubelet[1446]: E1213 02:04:38.781696    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:39.782455 kubelet[1446]: E1213 02:04:39.782390    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:40.739635 kubelet[1446]: E1213 02:04:40.739567    1446 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:40.762455 env[1196]: time="2024-12-13T02:04:40.762417968Z" level=info msg="StopPodSandbox for \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\""
Dec 13 02:04:40.783071 kubelet[1446]: E1213 02:04:40.783007    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:40.828492 env[1196]: 2024-12-13 02:04:40.796 [WARNING][2866] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.101-k8s-csi--node--driver--xbcmp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"59f0a7f5-8486-488b-9fce-b28d042e294f", ResourceVersion:"1071", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 40, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.101", ContainerID:"b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf", Pod:"csi-node-driver-xbcmp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.20.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif2d12061c20", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:04:40.828492 env[1196]: 2024-12-13 02:04:40.796 [INFO][2866] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610"
Dec 13 02:04:40.828492 env[1196]: 2024-12-13 02:04:40.796 [INFO][2866] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" iface="eth0" netns=""
Dec 13 02:04:40.828492 env[1196]: 2024-12-13 02:04:40.796 [INFO][2866] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610"
Dec 13 02:04:40.828492 env[1196]: 2024-12-13 02:04:40.796 [INFO][2866] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610"
Dec 13 02:04:40.828492 env[1196]: 2024-12-13 02:04:40.816 [INFO][2874] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" HandleID="k8s-pod-network.1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" Workload="10.0.0.101-k8s-csi--node--driver--xbcmp-eth0"
Dec 13 02:04:40.828492 env[1196]: 2024-12-13 02:04:40.816 [INFO][2874] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:04:40.828492 env[1196]: 2024-12-13 02:04:40.816 [INFO][2874] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:04:40.828492 env[1196]: 2024-12-13 02:04:40.823 [WARNING][2874] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" HandleID="k8s-pod-network.1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" Workload="10.0.0.101-k8s-csi--node--driver--xbcmp-eth0"
Dec 13 02:04:40.828492 env[1196]: 2024-12-13 02:04:40.823 [INFO][2874] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" HandleID="k8s-pod-network.1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" Workload="10.0.0.101-k8s-csi--node--driver--xbcmp-eth0"
Dec 13 02:04:40.828492 env[1196]: 2024-12-13 02:04:40.825 [INFO][2874] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:04:40.828492 env[1196]: 2024-12-13 02:04:40.826 [INFO][2866] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610"
Dec 13 02:04:40.829144 env[1196]: time="2024-12-13T02:04:40.828515511Z" level=info msg="TearDown network for sandbox \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\" successfully"
Dec 13 02:04:40.829144 env[1196]: time="2024-12-13T02:04:40.828544085Z" level=info msg="StopPodSandbox for \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\" returns successfully"
Dec 13 02:04:40.829269 env[1196]: time="2024-12-13T02:04:40.829225927Z" level=info msg="RemovePodSandbox for \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\""
Dec 13 02:04:40.829300 env[1196]: time="2024-12-13T02:04:40.829268276Z" level=info msg="Forcibly stopping sandbox \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\""
Dec 13 02:04:40.976863 env[1196]: 2024-12-13 02:04:40.863 [WARNING][2898] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.101-k8s-csi--node--driver--xbcmp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"59f0a7f5-8486-488b-9fce-b28d042e294f", ResourceVersion:"1071", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 40, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.101", ContainerID:"b2d7171860c814f8b5616132682911b73bbff19ff6e71c504f1d883ee47c0cdf", Pod:"csi-node-driver-xbcmp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.20.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif2d12061c20", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:04:40.976863 env[1196]: 2024-12-13 02:04:40.864 [INFO][2898] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610"
Dec 13 02:04:40.976863 env[1196]: 2024-12-13 02:04:40.864 [INFO][2898] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" iface="eth0" netns=""
Dec 13 02:04:40.976863 env[1196]: 2024-12-13 02:04:40.864 [INFO][2898] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610"
Dec 13 02:04:40.976863 env[1196]: 2024-12-13 02:04:40.864 [INFO][2898] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610"
Dec 13 02:04:40.976863 env[1196]: 2024-12-13 02:04:40.966 [INFO][2906] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" HandleID="k8s-pod-network.1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" Workload="10.0.0.101-k8s-csi--node--driver--xbcmp-eth0"
Dec 13 02:04:40.976863 env[1196]: 2024-12-13 02:04:40.967 [INFO][2906] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:04:40.976863 env[1196]: 2024-12-13 02:04:40.967 [INFO][2906] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:04:40.976863 env[1196]: 2024-12-13 02:04:40.973 [WARNING][2906] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" HandleID="k8s-pod-network.1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" Workload="10.0.0.101-k8s-csi--node--driver--xbcmp-eth0"
Dec 13 02:04:40.976863 env[1196]: 2024-12-13 02:04:40.973 [INFO][2906] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" HandleID="k8s-pod-network.1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610" Workload="10.0.0.101-k8s-csi--node--driver--xbcmp-eth0"
Dec 13 02:04:40.976863 env[1196]: 2024-12-13 02:04:40.974 [INFO][2906] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:04:40.976863 env[1196]: 2024-12-13 02:04:40.975 [INFO][2898] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610"
Dec 13 02:04:40.977357 env[1196]: time="2024-12-13T02:04:40.976895515Z" level=info msg="TearDown network for sandbox \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\" successfully"
Dec 13 02:04:40.986628 env[1196]: time="2024-12-13T02:04:40.986556708Z" level=info msg="RemovePodSandbox \"1d95802a588b299e04fa52b74bd4fc29a742ba6f29a0894dd48f82c1591e6610\" returns successfully"
Dec 13 02:04:40.987150 env[1196]: time="2024-12-13T02:04:40.987115248Z" level=info msg="StopPodSandbox for \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\""
Dec 13 02:04:41.044445 env[1196]: 2024-12-13 02:04:41.018 [WARNING][2930] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"36883c6e-4255-4cfe-a6bc-691d38fc69ee", ResourceVersion:"1034", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.101", ContainerID:"dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8", Pod:"nginx-deployment-85f456d6dd-xcxrr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calieaa57dde9f8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:04:41.044445 env[1196]: 2024-12-13 02:04:41.019 [INFO][2930] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5"
Dec 13 02:04:41.044445 env[1196]: 2024-12-13 02:04:41.019 [INFO][2930] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" iface="eth0" netns=""
Dec 13 02:04:41.044445 env[1196]: 2024-12-13 02:04:41.019 [INFO][2930] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5"
Dec 13 02:04:41.044445 env[1196]: 2024-12-13 02:04:41.019 [INFO][2930] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5"
Dec 13 02:04:41.044445 env[1196]: 2024-12-13 02:04:41.035 [INFO][2937] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" HandleID="k8s-pod-network.3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" Workload="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0"
Dec 13 02:04:41.044445 env[1196]: 2024-12-13 02:04:41.036 [INFO][2937] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:04:41.044445 env[1196]: 2024-12-13 02:04:41.036 [INFO][2937] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:04:41.044445 env[1196]: 2024-12-13 02:04:41.041 [WARNING][2937] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" HandleID="k8s-pod-network.3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" Workload="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0"
Dec 13 02:04:41.044445 env[1196]: 2024-12-13 02:04:41.041 [INFO][2937] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" HandleID="k8s-pod-network.3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" Workload="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0"
Dec 13 02:04:41.044445 env[1196]: 2024-12-13 02:04:41.042 [INFO][2937] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:04:41.044445 env[1196]: 2024-12-13 02:04:41.043 [INFO][2930] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5"
Dec 13 02:04:41.044445 env[1196]: time="2024-12-13T02:04:41.044413626Z" level=info msg="TearDown network for sandbox \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\" successfully"
Dec 13 02:04:41.044974 env[1196]: time="2024-12-13T02:04:41.044450625Z" level=info msg="StopPodSandbox for \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\" returns successfully"
Dec 13 02:04:41.045206 env[1196]: time="2024-12-13T02:04:41.045166651Z" level=info msg="RemovePodSandbox for \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\""
Dec 13 02:04:41.045267 env[1196]: time="2024-12-13T02:04:41.045205494Z" level=info msg="Forcibly stopping sandbox \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\""
Dec 13 02:04:41.098257 env[1196]: 2024-12-13 02:04:41.073 [WARNING][2959] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"36883c6e-4255-4cfe-a6bc-691d38fc69ee", ResourceVersion:"1034", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 3, 58, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.101", ContainerID:"dc96c0352f1ba174f2c3f819ce56e4336c643659e695867c91636beb26a772e8", Pod:"nginx-deployment-85f456d6dd-xcxrr", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calieaa57dde9f8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:04:41.098257 env[1196]: 2024-12-13 02:04:41.073 [INFO][2959] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5"
Dec 13 02:04:41.098257 env[1196]: 2024-12-13 02:04:41.073 [INFO][2959] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" iface="eth0" netns=""
Dec 13 02:04:41.098257 env[1196]: 2024-12-13 02:04:41.073 [INFO][2959] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5"
Dec 13 02:04:41.098257 env[1196]: 2024-12-13 02:04:41.073 [INFO][2959] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5"
Dec 13 02:04:41.098257 env[1196]: 2024-12-13 02:04:41.088 [INFO][2967] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" HandleID="k8s-pod-network.3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" Workload="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0"
Dec 13 02:04:41.098257 env[1196]: 2024-12-13 02:04:41.089 [INFO][2967] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:04:41.098257 env[1196]: 2024-12-13 02:04:41.089 [INFO][2967] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:04:41.098257 env[1196]: 2024-12-13 02:04:41.094 [WARNING][2967] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" HandleID="k8s-pod-network.3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" Workload="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0"
Dec 13 02:04:41.098257 env[1196]: 2024-12-13 02:04:41.094 [INFO][2967] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" HandleID="k8s-pod-network.3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5" Workload="10.0.0.101-k8s-nginx--deployment--85f456d6dd--xcxrr-eth0"
Dec 13 02:04:41.098257 env[1196]: 2024-12-13 02:04:41.095 [INFO][2967] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:04:41.098257 env[1196]: 2024-12-13 02:04:41.097 [INFO][2959] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5"
Dec 13 02:04:41.098804 env[1196]: time="2024-12-13T02:04:41.098295918Z" level=info msg="TearDown network for sandbox \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\" successfully"
Dec 13 02:04:41.101429 env[1196]: time="2024-12-13T02:04:41.101388311Z" level=info msg="RemovePodSandbox \"3528db87ba9e5eb7cde4d47b8b38a4549028468a7f873723b9bb12d7dd6daeb5\" returns successfully"
Dec 13 02:04:41.783508 kubelet[1446]: E1213 02:04:41.783436    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:42.737724 kubelet[1446]: E1213 02:04:42.737695    1446 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 02:04:42.784356 kubelet[1446]: E1213 02:04:42.784308    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:43.784484 kubelet[1446]: E1213 02:04:43.784416    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:43.894074 kubelet[1446]: I1213 02:04:43.894027    1446 topology_manager.go:215] "Topology Admit Handler" podUID="fe2e730c-f9d9-4166-b1e7-ddd383eab286" podNamespace="default" podName="test-pod-1"
Dec 13 02:04:43.898799 systemd[1]: Created slice kubepods-besteffort-podfe2e730c_f9d9_4166_b1e7_ddd383eab286.slice.
Dec 13 02:04:44.087053 kubelet[1446]: I1213 02:04:44.087011    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-0692754e-775a-4d8c-8a47-1cc6871262c1\" (UniqueName: \"kubernetes.io/nfs/fe2e730c-f9d9-4166-b1e7-ddd383eab286-pvc-0692754e-775a-4d8c-8a47-1cc6871262c1\") pod \"test-pod-1\" (UID: \"fe2e730c-f9d9-4166-b1e7-ddd383eab286\") " pod="default/test-pod-1"
Dec 13 02:04:44.087053 kubelet[1446]: I1213 02:04:44.087066    1446 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j8777\" (UniqueName: \"kubernetes.io/projected/fe2e730c-f9d9-4166-b1e7-ddd383eab286-kube-api-access-j8777\") pod \"test-pod-1\" (UID: \"fe2e730c-f9d9-4166-b1e7-ddd383eab286\") " pod="default/test-pod-1"
Dec 13 02:04:44.196000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.200123 kernel: Failed to create system directory netfs
Dec 13 02:04:44.200179 kernel: kauditd_printk_skb: 74 callbacks suppressed
Dec 13 02:04:44.200197 kernel: audit: type=1400 audit(1734055484.196:762): avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.200222 kernel: Failed to create system directory netfs
Dec 13 02:04:44.200237 kernel: audit: type=1400 audit(1734055484.196:762): avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.196000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.203416 kernel: Failed to create system directory netfs
Dec 13 02:04:44.203466 kernel: Failed to create system directory netfs
Dec 13 02:04:44.196000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.212793 kernel: audit: type=1400 audit(1734055484.196:762): avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.212855 kernel: audit: type=1400 audit(1734055484.196:762): avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.196000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.196000 audit[3004]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55db6849c5e0 a1=153bc a2=55db65b902b0 a3=5 items=0 ppid=530 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:44.196000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Dec 13 02:04:44.223145 kernel: audit: type=1300 audit(1734055484.196:762): arch=c000003e syscall=175 success=yes exit=0 a0=55db6849c5e0 a1=153bc a2=55db65b902b0 a3=5 items=0 ppid=530 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:44.223276 kernel: audit: type=1327 audit(1734055484.196:762): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Dec 13 02:04:44.223299 kernel: Failed to create system directory fscache
Dec 13 02:04:44.223320 kernel: audit: type=1400 audit(1734055484.220:763): avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.220000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.223950 kernel: Failed to create system directory fscache
Dec 13 02:04:44.223980 kernel: Failed to create system directory fscache
Dec 13 02:04:44.227248 kernel: audit: type=1400 audit(1734055484.220:763): avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.227282 kernel: audit: type=1400 audit(1734055484.220:763): avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.220000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.220000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.228001 kernel: Failed to create system directory fscache
Dec 13 02:04:44.220000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.232015 kernel: audit: type=1400 audit(1734055484.220:763): avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.232048 kernel: Failed to create system directory fscache
Dec 13 02:04:44.220000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.220000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.240839 kernel: Failed to create system directory fscache
Dec 13 02:04:44.240883 kernel: Failed to create system directory fscache
Dec 13 02:04:44.220000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.220000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.242307 kernel: Failed to create system directory fscache
Dec 13 02:04:44.242354 kernel: Failed to create system directory fscache
Dec 13 02:04:44.220000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.243028 kernel: Failed to create system directory fscache
Dec 13 02:04:44.220000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.243794 kernel: Failed to create system directory fscache
Dec 13 02:04:44.220000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.220000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.245236 kernel: Failed to create system directory fscache
Dec 13 02:04:44.245275 kernel: Failed to create system directory fscache
Dec 13 02:04:44.220000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.220000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.246777 kernel: Failed to create system directory fscache
Dec 13 02:04:44.220000 audit[3004]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55db686b19c0 a1=4c0fc a2=55db65b902b0 a3=5 items=0 ppid=530 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:44.220000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Dec 13 02:04:44.249918 kernel: FS-Cache: Loaded
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.279302 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.279341 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.279362 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.279377 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.280774 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.280812 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.282192 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.282221 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.284357 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.284385 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.284398 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.285123 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.287300 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.287341 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.287356 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.288770 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.288817 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.290232 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.290275 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.292460 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.292482 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.292495 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.293915 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.293944 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.295392 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.295409 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.296852 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.296870 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.298302 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.298332 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.299790 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.299810 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.301230 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.301259 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.302764 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.302786 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.304463 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.304493 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.306191 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.306226 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.307778 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.307815 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.309250 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.309281 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.310773 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.310809 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.312238 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.312275 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.314484 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.314503 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.314545 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.315980 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.316021 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.317456 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.317494 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.318947 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.318985 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.320434 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.320453 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.321949 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.321984 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.323389 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.323418 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.324913 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.324938 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.326375 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.326394 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.327873 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.327916 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.329366 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.329393 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.330836 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.330862 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.332282 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.332322 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.334461 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.334494 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.334520 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.335957 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.335986 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.337424 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.337530 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.341001 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.341050 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.342793 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.342835 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.344258 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.344294 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.346456 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.346484 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.346503 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.347910 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.347944 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.349391 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.349411 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.350907 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.350935 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.352377 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.352415 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.353860 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.353900 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.355325 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.355354 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.356045 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.356778 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.358199 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.358255 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.360381 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.360420 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.360452 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.361861 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.361894 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.363317 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.363343 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.364828 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.364856 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.366296 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.366324 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.367815 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.367853 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.369260 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.369295 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.371425 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.371453 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.371472 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.267000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.372883 kernel: Failed to create system directory sunrpc
Dec 13 02:04:44.382409 kernel: RPC: Registered named UNIX socket transport module.
Dec 13 02:04:44.382456 kernel: RPC: Registered udp transport module.
Dec 13 02:04:44.382481 kernel: RPC: Registered tcp transport module.
Dec 13 02:04:44.383089 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module.
Dec 13 02:04:44.267000 audit[3004]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55db686fdad0 a1=1a7f1c a2=55db65b902b0 a3=5 items=6 ppid=530 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:44.267000 audit: CWD cwd="/"
Dec 13 02:04:44.267000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:04:44.267000 audit: PATH item=1 name=(null) inode=23884 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:04:44.267000 audit: PATH item=2 name=(null) inode=23884 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:04:44.267000 audit: PATH item=3 name=(null) inode=23885 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:04:44.267000 audit: PATH item=4 name=(null) inode=23884 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:04:44.267000 audit: PATH item=5 name=(null) inode=23886 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 02:04:44.267000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.425442 kernel: Failed to create system directory nfs
Dec 13 02:04:44.425492 kernel: Failed to create system directory nfs
Dec 13 02:04:44.425513 kernel: Failed to create system directory nfs
Dec 13 02:04:44.425533 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.427109 kernel: Failed to create system directory nfs
Dec 13 02:04:44.427138 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.428811 kernel: Failed to create system directory nfs
Dec 13 02:04:44.428855 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.430463 kernel: Failed to create system directory nfs
Dec 13 02:04:44.430499 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.432145 kernel: Failed to create system directory nfs
Dec 13 02:04:44.432181 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.433807 kernel: Failed to create system directory nfs
Dec 13 02:04:44.433856 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.435422 kernel: Failed to create system directory nfs
Dec 13 02:04:44.435459 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.437082 kernel: Failed to create system directory nfs
Dec 13 02:04:44.437117 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.439404 kernel: Failed to create system directory nfs
Dec 13 02:04:44.439441 kernel: Failed to create system directory nfs
Dec 13 02:04:44.439458 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.440102 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.442261 kernel: Failed to create system directory nfs
Dec 13 02:04:44.442292 kernel: Failed to create system directory nfs
Dec 13 02:04:44.442310 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.444425 kernel: Failed to create system directory nfs
Dec 13 02:04:44.444453 kernel: Failed to create system directory nfs
Dec 13 02:04:44.444478 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.445134 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.447356 kernel: Failed to create system directory nfs
Dec 13 02:04:44.447387 kernel: Failed to create system directory nfs
Dec 13 02:04:44.447413 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.448810 kernel: Failed to create system directory nfs
Dec 13 02:04:44.448838 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.450226 kernel: Failed to create system directory nfs
Dec 13 02:04:44.450262 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.452401 kernel: Failed to create system directory nfs
Dec 13 02:04:44.452432 kernel: Failed to create system directory nfs
Dec 13 02:04:44.452457 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.453895 kernel: Failed to create system directory nfs
Dec 13 02:04:44.453928 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.455311 kernel: Failed to create system directory nfs
Dec 13 02:04:44.455340 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.457492 kernel: Failed to create system directory nfs
Dec 13 02:04:44.457525 kernel: Failed to create system directory nfs
Dec 13 02:04:44.457539 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.458195 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.460241 kernel: Failed to create system directory nfs
Dec 13 02:04:44.460269 kernel: Failed to create system directory nfs
Dec 13 02:04:44.460286 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.461830 kernel: Failed to create system directory nfs
Dec 13 02:04:44.461854 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.463345 kernel: Failed to create system directory nfs
Dec 13 02:04:44.463371 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.465014 kernel: Failed to create system directory nfs
Dec 13 02:04:44.465054 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.467401 kernel: Failed to create system directory nfs
Dec 13 02:04:44.467438 kernel: Failed to create system directory nfs
Dec 13 02:04:44.467461 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.416000 audit[3004]: AVC avc:  denied  { confidentiality } for  pid=3004 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.468848 kernel: Failed to create system directory nfs
Dec 13 02:04:44.416000 audit[3004]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55db6891e700 a1=16e97c a2=55db65b902b0 a3=5 items=0 ppid=530 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:44.416000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Dec 13 02:04:44.491777 kernel: FS-Cache: Netfs 'nfs' registered for caching
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.528337 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.528392 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.528411 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.529917 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.529956 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.531316 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.531352 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.532799 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.532835 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.534206 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.534248 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.534928 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.536343 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.536371 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.538439 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.538469 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.538484 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.539922 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.539968 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.541327 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.541365 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.542809 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.542867 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.544254 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.544299 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.546467 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.546513 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.546536 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.547889 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.547927 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.549288 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.549324 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.551431 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.551458 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.551475 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.552916 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.552948 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.554415 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.554451 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.555928 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.555959 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.557430 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.557467 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.558925 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.558945 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.560313 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.560338 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.561818 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.561843 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.563258 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.563287 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.565469 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.565508 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.565537 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.566972 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.567014 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.568448 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.568478 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.569939 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.569969 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.571392 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.571421 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.572888 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.572932 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.574343 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.574379 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.575858 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.575896 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.577341 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.577383 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.578851 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.578882 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.580291 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.580319 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.581794 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.581835 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.583247 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.583276 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.585431 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.585478 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.585495 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.586904 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.586936 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.591064 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.591176 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.592581 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.593490 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.594196 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.594914 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.596362 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.596404 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.597790 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.597820 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.516000 audit[3009]: AVC avc:  denied  { confidentiality } for  pid=3009 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.599202 kernel: Failed to create system directory nfs4
Dec 13 02:04:44.742233 kernel: NFS: Registering the id_resolver key type
Dec 13 02:04:44.742371 kernel: Key type id_resolver registered
Dec 13 02:04:44.742393 kernel: Key type id_legacy registered
Dec 13 02:04:44.516000 audit[3009]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f84d1ea1010 a1=208de4 a2=55d3342252b0 a3=5 items=0 ppid=530 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:44.516000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.755137 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.755192 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.755217 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.756884 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.756918 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.758655 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.758692 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.760319 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.760359 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.761860 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.761889 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.763351 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.763368 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.764882 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.764930 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.766501 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.766575 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.768054 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.768092 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.770430 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.770469 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.770486 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.771949 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.771987 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.773420 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.773459 kernel: Failed to create system directory rpcgss
Dec 13 02:04:44.750000 audit[3010]: AVC avc:  denied  { confidentiality } for  pid=3010 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 02:04:44.750000 audit[3010]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f3a62e01010 a1=70af4 a2=562095dbc2b0 a3=5 items=0 ppid=530 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:44.750000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36
Dec 13 02:04:44.784656 kubelet[1446]: E1213 02:04:44.784584    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:44.787494 nfsidmap[3020]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain'
Dec 13 02:04:44.790298 nfsidmap[3023]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain'
Dec 13 02:04:44.797000 audit[1266]: AVC avc:  denied  { watch_reads } for  pid=1266 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2711 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Dec 13 02:04:44.797000 audit[1]: AVC avc:  denied  { watch_reads } for  pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2711 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Dec 13 02:04:44.797000 audit[1266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55aa904d3a20 a2=10 a3=5877886b2c836abe items=0 ppid=1 pid=1266 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:44.797000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572
Dec 13 02:04:44.797000 audit[1]: AVC avc:  denied  { watch_reads } for  pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2711 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Dec 13 02:04:44.797000 audit[1]: AVC avc:  denied  { watch_reads } for  pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2711 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Dec 13 02:04:44.797000 audit[1266]: AVC avc:  denied  { watch_reads } for  pid=1266 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2711 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Dec 13 02:04:44.797000 audit[1266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55aa904d3a20 a2=10 a3=5877886b2c836abe items=0 ppid=1 pid=1266 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:44.797000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572
Dec 13 02:04:44.797000 audit[1266]: AVC avc:  denied  { watch_reads } for  pid=1266 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2711 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Dec 13 02:04:44.797000 audit[1266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55aa904d3a20 a2=10 a3=5877886b2c836abe items=0 ppid=1 pid=1266 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:44.797000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572
Dec 13 02:04:44.801636 env[1196]: time="2024-12-13T02:04:44.801584127Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:fe2e730c-f9d9-4166-b1e7-ddd383eab286,Namespace:default,Attempt:0,}"
Dec 13 02:04:44.907932 systemd-networkd[1026]: cali5ec59c6bf6e: Link UP
Dec 13 02:04:44.911948 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Dec 13 02:04:44.912034 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready
Dec 13 02:04:44.912024 systemd-networkd[1026]: cali5ec59c6bf6e: Gained carrier
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.844 [INFO][3031] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.101-k8s-test--pod--1-eth0  default  fe2e730c-f9d9-4166-b1e7-ddd383eab286 1185 0 2024-12-13 02:04:27 +0000 UTC <nil> <nil> map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s  10.0.0.101  test-pod-1 eth0 default [] []   [kns.default ksa.default.default] cali5ec59c6bf6e  [] []}} ContainerID="595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.101-k8s-test--pod--1-"
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.844 [INFO][3031] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.101-k8s-test--pod--1-eth0"
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.868 [INFO][3040] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718" HandleID="k8s-pod-network.595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718" Workload="10.0.0.101-k8s-test--pod--1-eth0"
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.878 [INFO][3040] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718" HandleID="k8s-pod-network.595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718" Workload="10.0.0.101-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f5560), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.101", "pod":"test-pod-1", "timestamp":"2024-12-13 02:04:44.868239768 +0000 UTC"}, Hostname:"10.0.0.101", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.878 [INFO][3040] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.878 [INFO][3040] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.878 [INFO][3040] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.101'
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.879 [INFO][3040] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718" host="10.0.0.101"
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.884 [INFO][3040] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.101"
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.888 [INFO][3040] ipam/ipam.go 489: Trying affinity for 192.168.20.128/26 host="10.0.0.101"
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.890 [INFO][3040] ipam/ipam.go 155: Attempting to load block cidr=192.168.20.128/26 host="10.0.0.101"
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.892 [INFO][3040] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.128/26 host="10.0.0.101"
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.892 [INFO][3040] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.128/26 handle="k8s-pod-network.595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718" host="10.0.0.101"
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.895 [INFO][3040] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.899 [INFO][3040] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.20.128/26 handle="k8s-pod-network.595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718" host="10.0.0.101"
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.904 [INFO][3040] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.20.132/26] block=192.168.20.128/26 handle="k8s-pod-network.595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718" host="10.0.0.101"
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.904 [INFO][3040] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.132/26] handle="k8s-pod-network.595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718" host="10.0.0.101"
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.904 [INFO][3040] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.904 [INFO][3040] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.20.132/26] IPv6=[] ContainerID="595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718" HandleID="k8s-pod-network.595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718" Workload="10.0.0.101-k8s-test--pod--1-eth0"
Dec 13 02:04:44.920084 env[1196]: 2024-12-13 02:04:44.905 [INFO][3031] cni-plugin/k8s.go 386: Populated endpoint ContainerID="595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.101-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.101-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"fe2e730c-f9d9-4166-b1e7-ddd383eab286", ResourceVersion:"1185", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 27, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.101", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:04:44.920786 env[1196]: 2024-12-13 02:04:44.905 [INFO][3031] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.20.132/32] ContainerID="595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.101-k8s-test--pod--1-eth0"
Dec 13 02:04:44.920786 env[1196]: 2024-12-13 02:04:44.906 [INFO][3031] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.101-k8s-test--pod--1-eth0"
Dec 13 02:04:44.920786 env[1196]: 2024-12-13 02:04:44.912 [INFO][3031] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.101-k8s-test--pod--1-eth0"
Dec 13 02:04:44.920786 env[1196]: 2024-12-13 02:04:44.912 [INFO][3031] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.101-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.101-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"fe2e730c-f9d9-4166-b1e7-ddd383eab286", ResourceVersion:"1185", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 4, 27, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.101", ContainerID:"595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"5a:08:b9:89:3a:50", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 02:04:44.920786 env[1196]: 2024-12-13 02:04:44.918 [INFO][3031] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.101-k8s-test--pod--1-eth0"
Dec 13 02:04:44.929000 audit[3062]: NETFILTER_CFG table=filter:94 family=2 entries=38 op=nft_register_chain pid=3062 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 02:04:44.929000 audit[3062]: SYSCALL arch=c000003e syscall=46 success=yes exit=19400 a0=3 a1=7fff93df0340 a2=0 a3=7fff93df032c items=0 ppid=2072 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:44.929000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 02:04:45.083282 env[1196]: time="2024-12-13T02:04:45.083193556Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 02:04:45.083282 env[1196]: time="2024-12-13T02:04:45.083241756Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 02:04:45.083282 env[1196]: time="2024-12-13T02:04:45.083255783Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 02:04:45.083475 env[1196]: time="2024-12-13T02:04:45.083409090Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718 pid=3070 runtime=io.containerd.runc.v2
Dec 13 02:04:45.093124 systemd[1]: Started cri-containerd-595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718.scope.
Dec 13 02:04:45.103000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.103000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.103000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.103000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.103000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.103000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.103000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.103000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.103000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.103000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.103000 audit: BPF prog-id=126 op=LOAD
Dec 13 02:04:45.103000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.103000 audit[3079]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3070 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:45.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539356562303433316465643131353565323066303766363434333032
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3070 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:45.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539356562303433316465643131353565323066303766363434333032
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit: BPF prog-id=127 op=LOAD
Dec 13 02:04:45.104000 audit[3079]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000286190 items=0 ppid=3070 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:45.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539356562303433316465643131353565323066303766363434333032
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit: BPF prog-id=128 op=LOAD
Dec 13 02:04:45.104000 audit[3079]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002861d8 items=0 ppid=3070 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:45.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539356562303433316465643131353565323066303766363434333032
Dec 13 02:04:45.104000 audit: BPF prog-id=128 op=UNLOAD
Dec 13 02:04:45.104000 audit: BPF prog-id=127 op=UNLOAD
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { perfmon } for  pid=3079 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit[3079]: AVC avc:  denied  { bpf } for  pid=3079 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.104000 audit: BPF prog-id=129 op=LOAD
Dec 13 02:04:45.104000 audit[3079]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002865e8 items=0 ppid=3070 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:45.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539356562303433316465643131353565323066303766363434333032
Dec 13 02:04:45.105851 systemd-resolved[1137]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address
Dec 13 02:04:45.124722 env[1196]: time="2024-12-13T02:04:45.124672933Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:fe2e730c-f9d9-4166-b1e7-ddd383eab286,Namespace:default,Attempt:0,} returns sandbox id \"595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718\""
Dec 13 02:04:45.126243 env[1196]: time="2024-12-13T02:04:45.126195273Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\""
Dec 13 02:04:45.482155 env[1196]: time="2024-12-13T02:04:45.482078657Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:45.483905 env[1196]: time="2024-12-13T02:04:45.483839656Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:45.485549 env[1196]: time="2024-12-13T02:04:45.485499474Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:45.489793 env[1196]: time="2024-12-13T02:04:45.489723990Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 02:04:45.490339 env[1196]: time="2024-12-13T02:04:45.490301946Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\""
Dec 13 02:04:45.492898 env[1196]: time="2024-12-13T02:04:45.492857558Z" level=info msg="CreateContainer within sandbox \"595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718\" for container &ContainerMetadata{Name:test,Attempt:0,}"
Dec 13 02:04:45.507558 env[1196]: time="2024-12-13T02:04:45.507495518Z" level=info msg="CreateContainer within sandbox \"595eb0431ded1155e20f07f644302a6bd37682f943328044d8da6895827c0718\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"cdb81cc8c464e4f849e69f8877f17e7f080e1cb46b223054bea08cf80e25509f\""
Dec 13 02:04:45.508070 env[1196]: time="2024-12-13T02:04:45.508032667Z" level=info msg="StartContainer for \"cdb81cc8c464e4f849e69f8877f17e7f080e1cb46b223054bea08cf80e25509f\""
Dec 13 02:04:45.524633 systemd[1]: Started cri-containerd-cdb81cc8c464e4f849e69f8877f17e7f080e1cb46b223054bea08cf80e25509f.scope.
Dec 13 02:04:45.534000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit: BPF prog-id=130 op=LOAD
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[3110]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3070 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:45.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364623831636338633436346534663834396536396638383737663137
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[3110]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3070 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:45.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364623831636338633436346534663834396536396638383737663137
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit: BPF prog-id=131 op=LOAD
Dec 13 02:04:45.534000 audit[3110]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002c5d10 items=0 ppid=3070 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:45.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364623831636338633436346534663834396536396638383737663137
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.534000 audit: BPF prog-id=132 op=LOAD
Dec 13 02:04:45.534000 audit[3110]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002c5d58 items=0 ppid=3070 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:45.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364623831636338633436346534663834396536396638383737663137
Dec 13 02:04:45.535000 audit: BPF prog-id=132 op=UNLOAD
Dec 13 02:04:45.535000 audit: BPF prog-id=131 op=UNLOAD
Dec 13 02:04:45.535000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.535000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.535000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.535000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.535000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.535000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.535000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.535000 audit[3110]: AVC avc:  denied  { perfmon } for  pid=3110 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.535000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.535000 audit[3110]: AVC avc:  denied  { bpf } for  pid=3110 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 02:04:45.535000 audit: BPF prog-id=133 op=LOAD
Dec 13 02:04:45.535000 audit[3110]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ac168 items=0 ppid=3070 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:45.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364623831636338633436346534663834396536396638383737663137
Dec 13 02:04:45.549389 env[1196]: time="2024-12-13T02:04:45.549313122Z" level=info msg="StartContainer for \"cdb81cc8c464e4f849e69f8877f17e7f080e1cb46b223054bea08cf80e25509f\" returns successfully"
Dec 13 02:04:45.785550 kubelet[1446]: E1213 02:04:45.785414    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:46.129941 systemd-networkd[1026]: cali5ec59c6bf6e: Gained IPv6LL
Dec 13 02:04:46.291643 kubelet[1446]: I1213 02:04:46.291593    1446 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=18.925994887999998 podStartE2EDuration="19.291567285s" podCreationTimestamp="2024-12-13 02:04:27 +0000 UTC" firstStartedPulling="2024-12-13 02:04:45.125881774 +0000 UTC m=+64.792877636" lastFinishedPulling="2024-12-13 02:04:45.491454181 +0000 UTC m=+65.158450033" observedRunningTime="2024-12-13 02:04:46.29131964 +0000 UTC m=+65.958315502" watchObservedRunningTime="2024-12-13 02:04:46.291567285 +0000 UTC m=+65.958563147"
Dec 13 02:04:46.786223 kubelet[1446]: E1213 02:04:46.786165    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:47.786822 kubelet[1446]: E1213 02:04:47.786768    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:48.427000 audit[3163]: NETFILTER_CFG table=filter:95 family=2 entries=8 op=nft_register_rule pid=3163 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:48.427000 audit[3163]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc7fd76aa0 a2=0 a3=7ffc7fd76a8c items=0 ppid=1666 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:48.427000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:48.433000 audit[3163]: NETFILTER_CFG table=nat:96 family=2 entries=58 op=nft_register_chain pid=3163 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 02:04:48.433000 audit[3163]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7ffc7fd76aa0 a2=0 a3=7ffc7fd76a8c items=0 ppid=1666 pid=3163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 02:04:48.433000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 02:04:48.787221 kubelet[1446]: E1213 02:04:48.787081    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:49.787308 kubelet[1446]: E1213 02:04:49.787226    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 02:04:50.787554 kubelet[1446]: E1213 02:04:50.787496    1446 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"