Dec 13 14:18:20.081235 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:18:20.081260 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:18:20.081269 kernel: BIOS-provided physical RAM map: Dec 13 14:18:20.081274 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 14:18:20.081279 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 14:18:20.081285 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 14:18:20.081291 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable Dec 13 14:18:20.081297 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved Dec 13 14:18:20.081304 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 14:18:20.081309 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Dec 13 14:18:20.081315 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 14:18:20.081320 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 14:18:20.081325 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Dec 13 14:18:20.081331 kernel: NX (Execute Disable) protection: active Dec 13 14:18:20.081339 kernel: SMBIOS 2.8 present. Dec 13 14:18:20.081345 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Dec 13 14:18:20.081351 kernel: Hypervisor detected: KVM Dec 13 14:18:20.081376 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:18:20.081383 kernel: kvm-clock: cpu 0, msr 6919a001, primary cpu clock Dec 13 14:18:20.081388 kernel: kvm-clock: using sched offset of 3391031755 cycles Dec 13 14:18:20.081395 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:18:20.081402 kernel: tsc: Detected 2794.748 MHz processor Dec 13 14:18:20.081410 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:18:20.081420 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:18:20.081427 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 Dec 13 14:18:20.081436 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:18:20.081442 kernel: Using GB pages for direct mapping Dec 13 14:18:20.081448 kernel: ACPI: Early table checksum verification disabled Dec 13 14:18:20.081454 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) Dec 13 14:18:20.081460 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:18:20.081466 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:18:20.081472 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:18:20.081479 kernel: ACPI: FACS 0x000000009CFE0000 000040 Dec 13 14:18:20.081485 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:18:20.081491 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:18:20.081497 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:18:20.081503 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:18:20.081509 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db] Dec 13 14:18:20.081515 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7] Dec 13 14:18:20.081522 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Dec 13 14:18:20.081531 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b] Dec 13 14:18:20.081537 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3] Dec 13 14:18:20.081544 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df] Dec 13 14:18:20.081550 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407] Dec 13 14:18:20.081557 kernel: No NUMA configuration found Dec 13 14:18:20.081563 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] Dec 13 14:18:20.081571 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] Dec 13 14:18:20.081577 kernel: Zone ranges: Dec 13 14:18:20.081583 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:18:20.081590 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] Dec 13 14:18:20.081596 kernel: Normal empty Dec 13 14:18:20.081602 kernel: Movable zone start for each node Dec 13 14:18:20.081609 kernel: Early memory node ranges Dec 13 14:18:20.081615 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 14:18:20.081621 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] Dec 13 14:18:20.081629 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] Dec 13 14:18:20.081638 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:18:20.081645 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 14:18:20.081651 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges Dec 13 14:18:20.081658 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 14:18:20.081664 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:18:20.081671 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:18:20.081677 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 14:18:20.081683 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:18:20.081690 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:18:20.081698 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:18:20.081704 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:18:20.081710 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:18:20.081717 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 14:18:20.081723 kernel: TSC deadline timer available Dec 13 14:18:20.081730 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Dec 13 14:18:20.081736 kernel: kvm-guest: KVM setup pv remote TLB flush Dec 13 14:18:20.081742 kernel: kvm-guest: setup PV sched yield Dec 13 14:18:20.081749 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Dec 13 14:18:20.081757 kernel: Booting paravirtualized kernel on KVM Dec 13 14:18:20.081763 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:18:20.081770 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Dec 13 14:18:20.081776 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Dec 13 14:18:20.081783 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Dec 13 14:18:20.081789 kernel: pcpu-alloc: [0] 0 1 2 3 Dec 13 14:18:20.081795 kernel: kvm-guest: setup async PF for cpu 0 Dec 13 14:18:20.081802 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Dec 13 14:18:20.081808 kernel: kvm-guest: PV spinlocks enabled Dec 13 14:18:20.081816 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:18:20.081823 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 Dec 13 14:18:20.081829 kernel: Policy zone: DMA32 Dec 13 14:18:20.081836 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:18:20.081843 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:18:20.081850 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:18:20.081857 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:18:20.081863 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:18:20.081871 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 134796K reserved, 0K cma-reserved) Dec 13 14:18:20.081878 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 14:18:20.081884 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:18:20.081891 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:18:20.081897 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:18:20.081904 kernel: rcu: RCU event tracing is enabled. Dec 13 14:18:20.081911 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 14:18:20.081917 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:18:20.081924 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:18:20.081931 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:18:20.081938 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 14:18:20.081944 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Dec 13 14:18:20.081951 kernel: random: crng init done Dec 13 14:18:20.081957 kernel: Console: colour VGA+ 80x25 Dec 13 14:18:20.081963 kernel: printk: console [ttyS0] enabled Dec 13 14:18:20.081970 kernel: ACPI: Core revision 20210730 Dec 13 14:18:20.081976 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Dec 13 14:18:20.081983 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:18:20.081990 kernel: x2apic enabled Dec 13 14:18:20.081997 kernel: Switched APIC routing to physical x2apic. Dec 13 14:18:20.082012 kernel: kvm-guest: setup PV IPIs Dec 13 14:18:20.082019 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 14:18:20.082025 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 14:18:20.082034 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Dec 13 14:18:20.082041 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 14:18:20.082047 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 13 14:18:20.082054 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 13 14:18:20.082066 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:18:20.082073 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:18:20.082080 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:18:20.082088 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:18:20.082095 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 13 14:18:20.082102 kernel: RETBleed: Mitigation: untrained return thunk Dec 13 14:18:20.082109 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:18:20.082116 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:18:20.082123 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:18:20.082130 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:18:20.082137 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:18:20.082144 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:18:20.082151 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 14:18:20.082158 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:18:20.082164 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:18:20.082171 kernel: LSM: Security Framework initializing Dec 13 14:18:20.082178 kernel: SELinux: Initializing. Dec 13 14:18:20.082186 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:18:20.082193 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:18:20.082200 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 13 14:18:20.082207 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 13 14:18:20.082214 kernel: ... version: 0 Dec 13 14:18:20.082220 kernel: ... bit width: 48 Dec 13 14:18:20.082227 kernel: ... generic registers: 6 Dec 13 14:18:20.082234 kernel: ... value mask: 0000ffffffffffff Dec 13 14:18:20.082241 kernel: ... max period: 00007fffffffffff Dec 13 14:18:20.082249 kernel: ... fixed-purpose events: 0 Dec 13 14:18:20.082256 kernel: ... event mask: 000000000000003f Dec 13 14:18:20.082262 kernel: signal: max sigframe size: 1776 Dec 13 14:18:20.082269 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:18:20.082276 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:18:20.082305 kernel: x86: Booting SMP configuration: Dec 13 14:18:20.082320 kernel: .... node #0, CPUs: #1 Dec 13 14:18:20.082327 kernel: kvm-clock: cpu 1, msr 6919a041, secondary cpu clock Dec 13 14:18:20.082334 kernel: kvm-guest: setup async PF for cpu 1 Dec 13 14:18:20.082342 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Dec 13 14:18:20.082348 kernel: #2 Dec 13 14:18:20.082355 kernel: kvm-clock: cpu 2, msr 6919a081, secondary cpu clock Dec 13 14:18:20.082372 kernel: kvm-guest: setup async PF for cpu 2 Dec 13 14:18:20.082379 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Dec 13 14:18:20.082386 kernel: #3 Dec 13 14:18:20.082393 kernel: kvm-clock: cpu 3, msr 6919a0c1, secondary cpu clock Dec 13 14:18:20.082399 kernel: kvm-guest: setup async PF for cpu 3 Dec 13 14:18:20.082406 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Dec 13 14:18:20.082414 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 14:18:20.082421 kernel: smpboot: Max logical packages: 1 Dec 13 14:18:20.082428 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Dec 13 14:18:20.082435 kernel: devtmpfs: initialized Dec 13 14:18:20.082441 kernel: x86/mm: Memory block size: 128MB Dec 13 14:18:20.082448 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:18:20.082456 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 14:18:20.082462 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:18:20.082469 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:18:20.082477 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:18:20.082484 kernel: audit: type=2000 audit(1734099500.164:1): state=initialized audit_enabled=0 res=1 Dec 13 14:18:20.082491 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:18:20.082498 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:18:20.082504 kernel: cpuidle: using governor menu Dec 13 14:18:20.082511 kernel: ACPI: bus type PCI registered Dec 13 14:18:20.082522 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:18:20.082529 kernel: dca service started, version 1.12.1 Dec 13 14:18:20.082536 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 14:18:20.082544 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 14:18:20.082551 kernel: PCI: Using configuration type 1 for base access Dec 13 14:18:20.082558 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:18:20.082565 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:18:20.082572 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:18:20.082578 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:18:20.082585 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:18:20.082592 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:18:20.082598 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:18:20.082606 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:18:20.082613 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:18:20.082620 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:18:20.082627 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:18:20.082633 kernel: ACPI: Interpreter enabled Dec 13 14:18:20.082640 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 14:18:20.082647 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:18:20.082654 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:18:20.082661 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 14:18:20.082668 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:18:20.082796 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:18:20.082868 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Dec 13 14:18:20.082934 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Dec 13 14:18:20.082943 kernel: PCI host bridge to bus 0000:00 Dec 13 14:18:20.083026 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:18:20.083088 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:18:20.083150 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:18:20.083210 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Dec 13 14:18:20.083268 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 14:18:20.083327 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] Dec 13 14:18:20.083400 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:18:20.083481 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 14:18:20.083559 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Dec 13 14:18:20.083631 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Dec 13 14:18:20.083699 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Dec 13 14:18:20.083764 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Dec 13 14:18:20.083830 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:18:20.083904 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:18:20.083973 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] Dec 13 14:18:20.084072 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Dec 13 14:18:20.084141 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Dec 13 14:18:20.084215 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Dec 13 14:18:20.084285 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 14:18:20.084388 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Dec 13 14:18:20.084461 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Dec 13 14:18:20.084571 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 14:18:20.084654 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] Dec 13 14:18:20.084723 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Dec 13 14:18:20.084790 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Dec 13 14:18:20.084856 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Dec 13 14:18:20.084930 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 14:18:20.085008 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 14:18:20.085083 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 14:18:20.085154 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] Dec 13 14:18:20.085222 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] Dec 13 14:18:20.085295 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 14:18:20.085377 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Dec 13 14:18:20.085387 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:18:20.085395 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:18:20.085402 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:18:20.085411 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:18:20.085418 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 14:18:20.085425 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 14:18:20.085432 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 14:18:20.085439 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 14:18:20.085446 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 14:18:20.085452 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 14:18:20.085459 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 14:18:20.085466 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 14:18:20.085474 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 14:18:20.085481 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 14:18:20.085487 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 14:18:20.085494 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 14:18:20.085501 kernel: iommu: Default domain type: Translated Dec 13 14:18:20.085508 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:18:20.085576 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 14:18:20.085643 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:18:20.085709 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 14:18:20.085720 kernel: vgaarb: loaded Dec 13 14:18:20.085727 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:18:20.085734 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:18:20.085741 kernel: PTP clock support registered Dec 13 14:18:20.085748 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:18:20.085755 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:18:20.085762 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 14:18:20.085769 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] Dec 13 14:18:20.085775 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Dec 13 14:18:20.085783 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Dec 13 14:18:20.085790 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:18:20.085797 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:18:20.085804 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:18:20.085811 kernel: pnp: PnP ACPI init Dec 13 14:18:20.085882 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 14:18:20.085892 kernel: pnp: PnP ACPI: found 6 devices Dec 13 14:18:20.085899 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:18:20.085908 kernel: NET: Registered PF_INET protocol family Dec 13 14:18:20.085915 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:18:20.085922 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:18:20.085929 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:18:20.085935 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:18:20.085942 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:18:20.085949 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:18:20.085956 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:18:20.085964 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:18:20.085971 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:18:20.085978 kernel: NET: Registered PF_XDP protocol family Dec 13 14:18:20.086052 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:18:20.086117 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:18:20.086179 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:18:20.086241 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Dec 13 14:18:20.086301 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 14:18:20.086372 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] Dec 13 14:18:20.086384 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:18:20.086392 kernel: Initialise system trusted keyrings Dec 13 14:18:20.086399 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:18:20.086406 kernel: Key type asymmetric registered Dec 13 14:18:20.086412 kernel: Asymmetric key parser 'x509' registered Dec 13 14:18:20.086419 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:18:20.086426 kernel: io scheduler mq-deadline registered Dec 13 14:18:20.086433 kernel: io scheduler kyber registered Dec 13 14:18:20.086440 kernel: io scheduler bfq registered Dec 13 14:18:20.086448 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:18:20.086455 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 14:18:20.086462 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 14:18:20.086469 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 14:18:20.086476 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:18:20.086482 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:18:20.086489 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:18:20.086496 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:18:20.086503 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:18:20.086580 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 14:18:20.086590 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:18:20.086655 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 14:18:20.086722 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T14:18:19 UTC (1734099499) Dec 13 14:18:20.086784 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Dec 13 14:18:20.086793 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:18:20.086800 kernel: Segment Routing with IPv6 Dec 13 14:18:20.086807 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:18:20.086816 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:18:20.086823 kernel: Key type dns_resolver registered Dec 13 14:18:20.086830 kernel: IPI shorthand broadcast: enabled Dec 13 14:18:20.086837 kernel: sched_clock: Marking stable (438001941, 104705322)->(561189611, -18482348) Dec 13 14:18:20.086844 kernel: registered taskstats version 1 Dec 13 14:18:20.086851 kernel: Loading compiled-in X.509 certificates Dec 13 14:18:20.086858 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:18:20.086865 kernel: Key type .fscrypt registered Dec 13 14:18:20.086871 kernel: Key type fscrypt-provisioning registered Dec 13 14:18:20.086879 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:18:20.086886 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:18:20.086893 kernel: ima: No architecture policies found Dec 13 14:18:20.086900 kernel: clk: Disabling unused clocks Dec 13 14:18:20.086906 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:18:20.086913 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:18:20.086920 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:18:20.086927 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:18:20.086934 kernel: Run /init as init process Dec 13 14:18:20.086942 kernel: with arguments: Dec 13 14:18:20.086948 kernel: /init Dec 13 14:18:20.086955 kernel: with environment: Dec 13 14:18:20.086962 kernel: HOME=/ Dec 13 14:18:20.086968 kernel: TERM=linux Dec 13 14:18:20.086975 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:18:20.086984 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:18:20.086993 systemd[1]: Detected virtualization kvm. Dec 13 14:18:20.087011 systemd[1]: Detected architecture x86-64. Dec 13 14:18:20.087019 systemd[1]: Running in initrd. Dec 13 14:18:20.087026 systemd[1]: No hostname configured, using default hostname. Dec 13 14:18:20.087033 systemd[1]: Hostname set to . Dec 13 14:18:20.087041 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:18:20.087048 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:18:20.087055 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:18:20.087063 systemd[1]: Reached target cryptsetup.target. Dec 13 14:18:20.087071 systemd[1]: Reached target paths.target. Dec 13 14:18:20.087085 systemd[1]: Reached target slices.target. Dec 13 14:18:20.087093 systemd[1]: Reached target swap.target. Dec 13 14:18:20.087101 systemd[1]: Reached target timers.target. Dec 13 14:18:20.087109 systemd[1]: Listening on iscsid.socket. Dec 13 14:18:20.087117 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:18:20.087125 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:18:20.087133 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:18:20.087141 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:18:20.087148 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:18:20.087156 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:18:20.087163 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:18:20.087171 systemd[1]: Reached target sockets.target. Dec 13 14:18:20.087178 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:18:20.087187 systemd[1]: Finished network-cleanup.service. Dec 13 14:18:20.087195 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:18:20.087202 systemd[1]: Starting systemd-journald.service... Dec 13 14:18:20.087210 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:18:20.087217 systemd[1]: Starting systemd-resolved.service... Dec 13 14:18:20.087225 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:18:20.087233 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:18:20.087240 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:18:20.087257 systemd-journald[198]: Journal started Dec 13 14:18:20.087312 systemd-journald[198]: Runtime Journal (/run/log/journal/549a9e8ac6104c01bad72ce5437b1cac) is 6.0M, max 48.5M, 42.5M free. Dec 13 14:18:20.080021 systemd-modules-load[199]: Inserted module 'overlay' Dec 13 14:18:20.115110 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:18:20.115134 kernel: Bridge firewalling registered Dec 13 14:18:20.115145 kernel: audit: type=1130 audit(1734099500.114:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.103087 systemd-resolved[200]: Positive Trust Anchors: Dec 13 14:18:20.119146 systemd[1]: Started systemd-journald.service. Dec 13 14:18:20.103097 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:18:20.103128 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:18:20.105439 systemd-resolved[200]: Defaulting to hostname 'linux'. Dec 13 14:18:20.114240 systemd-modules-load[199]: Inserted module 'br_netfilter' Dec 13 14:18:20.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.130397 systemd[1]: Started systemd-resolved.service. Dec 13 14:18:20.133978 kernel: audit: type=1130 audit(1734099500.129:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.135145 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:18:20.139672 kernel: audit: type=1130 audit(1734099500.134:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.139870 systemd[1]: Reached target nss-lookup.target. Dec 13 14:18:20.144820 kernel: audit: type=1130 audit(1734099500.139:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.144833 kernel: SCSI subsystem initialized Dec 13 14:18:20.144838 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:18:20.146106 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:18:20.152974 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:18:20.157624 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:18:20.157642 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:18:20.157651 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:18:20.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.161378 kernel: audit: type=1130 audit(1734099500.157:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.161539 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:18:20.166400 kernel: audit: type=1130 audit(1734099500.162:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.162394 systemd-modules-load[199]: Inserted module 'dm_multipath' Dec 13 14:18:20.167397 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:18:20.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.169883 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:18:20.173585 kernel: audit: type=1130 audit(1734099500.168:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.174161 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:18:20.177796 dracut-cmdline[219]: dracut-dracut-053 Dec 13 14:18:20.180506 dracut-cmdline[219]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:18:20.185341 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:18:20.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.190382 kernel: audit: type=1130 audit(1734099500.186:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.235380 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:18:20.251394 kernel: iscsi: registered transport (tcp) Dec 13 14:18:20.272383 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:18:20.272407 kernel: QLogic iSCSI HBA Driver Dec 13 14:18:20.301051 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:18:20.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.303498 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:18:20.307077 kernel: audit: type=1130 audit(1734099500.302:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.347405 kernel: raid6: avx2x4 gen() 29985 MB/s Dec 13 14:18:20.364385 kernel: raid6: avx2x4 xor() 7606 MB/s Dec 13 14:18:20.381390 kernel: raid6: avx2x2 gen() 32245 MB/s Dec 13 14:18:20.398403 kernel: raid6: avx2x2 xor() 19211 MB/s Dec 13 14:18:20.415392 kernel: raid6: avx2x1 gen() 26314 MB/s Dec 13 14:18:20.432395 kernel: raid6: avx2x1 xor() 15185 MB/s Dec 13 14:18:20.449393 kernel: raid6: sse2x4 gen() 14726 MB/s Dec 13 14:18:20.466385 kernel: raid6: sse2x4 xor() 7405 MB/s Dec 13 14:18:20.483399 kernel: raid6: sse2x2 gen() 15559 MB/s Dec 13 14:18:20.500408 kernel: raid6: sse2x2 xor() 7947 MB/s Dec 13 14:18:20.517394 kernel: raid6: sse2x1 gen() 11213 MB/s Dec 13 14:18:20.534950 kernel: raid6: sse2x1 xor() 6851 MB/s Dec 13 14:18:20.535028 kernel: raid6: using algorithm avx2x2 gen() 32245 MB/s Dec 13 14:18:20.535056 kernel: raid6: .... xor() 19211 MB/s, rmw enabled Dec 13 14:18:20.535767 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:18:20.549398 kernel: xor: automatically using best checksumming function avx Dec 13 14:18:20.660394 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:18:20.669864 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:18:20.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.671000 audit: BPF prog-id=7 op=LOAD Dec 13 14:18:20.671000 audit: BPF prog-id=8 op=LOAD Dec 13 14:18:20.672285 systemd[1]: Starting systemd-udevd.service... Dec 13 14:18:20.684694 systemd-udevd[401]: Using default interface naming scheme 'v252'. Dec 13 14:18:20.688201 systemd[1]: Started systemd-udevd.service. Dec 13 14:18:20.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.690866 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:18:20.703819 dracut-pre-trigger[413]: rd.md=0: removing MD RAID activation Dec 13 14:18:20.729394 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:18:20.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.730653 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:18:20.760385 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:18:20.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:20.795394 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:18:20.795446 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 14:18:20.810152 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:18:20.810165 kernel: GPT:9289727 != 19775487 Dec 13 14:18:20.810174 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:18:20.810186 kernel: GPT:9289727 != 19775487 Dec 13 14:18:20.810194 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:18:20.810203 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:18:20.810212 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:18:20.810220 kernel: AES CTR mode by8 optimization enabled Dec 13 14:18:20.810228 kernel: libata version 3.00 loaded. Dec 13 14:18:20.823389 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 14:18:20.840105 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 14:18:20.840130 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 14:18:20.840224 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 14:18:20.840296 kernel: scsi host0: ahci Dec 13 14:18:20.840400 kernel: scsi host1: ahci Dec 13 14:18:20.840484 kernel: scsi host2: ahci Dec 13 14:18:20.840572 kernel: scsi host3: ahci Dec 13 14:18:20.840651 kernel: scsi host4: ahci Dec 13 14:18:20.840744 kernel: scsi host5: ahci Dec 13 14:18:20.840830 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 Dec 13 14:18:20.840840 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 Dec 13 14:18:20.840849 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 Dec 13 14:18:20.840858 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 Dec 13 14:18:20.840867 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 Dec 13 14:18:20.840875 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 Dec 13 14:18:20.838867 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:18:20.873683 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (447) Dec 13 14:18:20.874317 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:18:20.875436 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:18:20.882993 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:18:20.887241 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:18:20.888920 systemd[1]: Starting disk-uuid.service... Dec 13 14:18:20.920438 disk-uuid[529]: Primary Header is updated. Dec 13 14:18:20.920438 disk-uuid[529]: Secondary Entries is updated. Dec 13 14:18:20.920438 disk-uuid[529]: Secondary Header is updated. Dec 13 14:18:20.925389 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:18:20.929384 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:18:21.150235 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Dec 13 14:18:21.150315 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 14:18:21.150328 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 14:18:21.152301 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 14:18:21.152381 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 14:18:21.153379 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 14:18:21.154399 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 13 14:18:21.155672 kernel: ata3.00: applying bridge limits Dec 13 14:18:21.155719 kernel: ata3.00: configured for UDMA/100 Dec 13 14:18:21.160018 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 13 14:18:21.189407 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 13 14:18:21.206955 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:18:21.206991 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 14:18:21.937828 disk-uuid[530]: The operation has completed successfully. Dec 13 14:18:21.939413 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:18:22.008952 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:18:22.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:22.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:22.009057 systemd[1]: Finished disk-uuid.service. Dec 13 14:18:22.011135 systemd[1]: Starting verity-setup.service... Dec 13 14:18:22.031400 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Dec 13 14:18:22.054714 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:18:22.056972 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:18:22.059783 systemd[1]: Finished verity-setup.service. Dec 13 14:18:22.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:22.139414 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:18:22.139767 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:18:22.141511 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:18:22.143334 systemd[1]: Starting ignition-setup.service... Dec 13 14:18:22.144805 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:18:22.155622 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:18:22.155680 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:18:22.155695 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:18:22.165050 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:18:22.173995 systemd[1]: Finished ignition-setup.service. Dec 13 14:18:22.175983 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:18:22.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:22.212128 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:18:22.214852 systemd[1]: Starting systemd-networkd.service... Dec 13 14:18:22.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:22.213000 audit: BPF prog-id=9 op=LOAD Dec 13 14:18:22.219162 ignition[652]: Ignition 2.14.0 Dec 13 14:18:22.219172 ignition[652]: Stage: fetch-offline Dec 13 14:18:22.219219 ignition[652]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:18:22.219228 ignition[652]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:18:22.219321 ignition[652]: parsed url from cmdline: "" Dec 13 14:18:22.219324 ignition[652]: no config URL provided Dec 13 14:18:22.219328 ignition[652]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:18:22.219335 ignition[652]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:18:22.219351 ignition[652]: op(1): [started] loading QEMU firmware config module Dec 13 14:18:22.219373 ignition[652]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 14:18:22.224271 ignition[652]: op(1): [finished] loading QEMU firmware config module Dec 13 14:18:22.226912 ignition[652]: parsing config with SHA512: d46188976c618bf44c74bb404594c33b015b450f4124be48fc8d158f25a9551dbb2674a5ec020b5e822130221e82abe715646c3126128b461316e568e616dc22 Dec 13 14:18:22.232871 unknown[652]: fetched base config from "system" Dec 13 14:18:22.232910 unknown[652]: fetched user config from "qemu" Dec 13 14:18:22.233810 ignition[652]: fetch-offline: fetch-offline passed Dec 13 14:18:22.233923 ignition[652]: Ignition finished successfully Dec 13 14:18:22.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:22.235299 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:18:22.250539 systemd-networkd[720]: lo: Link UP Dec 13 14:18:22.250568 systemd-networkd[720]: lo: Gained carrier Dec 13 14:18:22.252342 systemd-networkd[720]: Enumeration completed Dec 13 14:18:22.252472 systemd[1]: Started systemd-networkd.service. Dec 13 14:18:22.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:22.253085 systemd[1]: Reached target network.target. Dec 13 14:18:22.255301 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 14:18:22.256057 systemd[1]: Starting ignition-kargs.service... Dec 13 14:18:22.257463 systemd[1]: Starting iscsiuio.service... Dec 13 14:18:22.260914 systemd-networkd[720]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:18:22.262596 systemd[1]: Started iscsiuio.service. Dec 13 14:18:22.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:22.264458 systemd[1]: Starting iscsid.service... Dec 13 14:18:22.264467 systemd-networkd[720]: eth0: Link UP Dec 13 14:18:22.264471 systemd-networkd[720]: eth0: Gained carrier Dec 13 14:18:22.268668 iscsid[735]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:18:22.268668 iscsid[735]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:18:22.268668 iscsid[735]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:18:22.268668 iscsid[735]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:18:22.268668 iscsid[735]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:18:22.268668 iscsid[735]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:18:22.268668 iscsid[735]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:18:22.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:22.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:22.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:22.268874 ignition[724]: Ignition 2.14.0 Dec 13 14:18:22.269935 systemd[1]: Started iscsid.service. Dec 13 14:18:22.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:22.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:22.268882 ignition[724]: Stage: kargs Dec 13 14:18:22.272431 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:18:22.269013 ignition[724]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:18:22.275746 systemd[1]: Finished ignition-kargs.service. Dec 13 14:18:22.269023 ignition[724]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:18:22.280093 systemd[1]: Starting ignition-disks.service... Dec 13 14:18:22.269970 ignition[724]: kargs: kargs passed Dec 13 14:18:22.283556 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:18:22.270018 ignition[724]: Ignition finished successfully Dec 13 14:18:22.284718 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:18:22.286819 ignition[742]: Ignition 2.14.0 Dec 13 14:18:22.289465 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:18:22.286824 ignition[742]: Stage: disks Dec 13 14:18:22.292040 systemd[1]: Reached target remote-fs.target. Dec 13 14:18:22.286904 ignition[742]: no configs at "/usr/lib/ignition/base.d" Dec 13 14:18:22.293862 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:18:22.318430 systemd-fsck[757]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 14:18:22.286912 ignition[742]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:18:22.294900 systemd[1]: Finished ignition-disks.service. Dec 13 14:18:22.287577 ignition[742]: disks: disks passed Dec 13 14:18:22.295432 systemd-networkd[720]: eth0: DHCPv4 address 10.0.0.25/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 14:18:22.287609 ignition[742]: Ignition finished successfully Dec 13 14:18:22.295894 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:18:22.296039 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:18:22.296199 systemd[1]: Reached target local-fs.target. Dec 13 14:18:22.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:22.296621 systemd[1]: Reached target sysinit.target. Dec 13 14:18:22.296804 systemd[1]: Reached target basic.target. Dec 13 14:18:22.301073 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:18:22.303008 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:18:22.327121 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:18:22.329333 systemd[1]: Mounting sysroot.mount... Dec 13 14:18:22.338389 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:18:22.339001 systemd[1]: Mounted sysroot.mount. Dec 13 14:18:22.339789 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:18:22.342407 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:18:22.343393 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:18:22.343425 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:18:22.343443 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:18:22.345514 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:18:22.347870 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:18:22.352901 initrd-setup-root[767]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:18:22.356972 initrd-setup-root[775]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:18:22.359737 initrd-setup-root[783]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:18:22.362882 initrd-setup-root[791]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:18:22.388257 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:18:22.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:22.390979 systemd[1]: Starting ignition-mount.service... Dec 13 14:18:22.393420 systemd[1]: Starting sysroot-boot.service... Dec 13 14:18:22.395691 bash[808]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 14:18:22.404425 ignition[809]: INFO : Ignition 2.14.0 Dec 13 14:18:22.405552 ignition[809]: INFO : Stage: mount Dec 13 14:18:22.405552 ignition[809]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:18:22.405552 ignition[809]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:18:22.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:22.410413 ignition[809]: INFO : mount: mount passed Dec 13 14:18:22.410413 ignition[809]: INFO : Ignition finished successfully Dec 13 14:18:22.407243 systemd[1]: Finished ignition-mount.service. Dec 13 14:18:22.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:22.411841 systemd[1]: Finished sysroot-boot.service. Dec 13 14:18:23.068566 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:18:23.074372 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (818) Dec 13 14:18:23.077207 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:18:23.077230 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:18:23.077246 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:18:23.080493 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:18:23.082375 systemd[1]: Starting ignition-files.service... Dec 13 14:18:23.095022 ignition[838]: INFO : Ignition 2.14.0 Dec 13 14:18:23.096062 ignition[838]: INFO : Stage: files Dec 13 14:18:23.096062 ignition[838]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:18:23.096062 ignition[838]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:18:23.099541 ignition[838]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:18:23.099541 ignition[838]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:18:23.099541 ignition[838]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:18:23.099541 ignition[838]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:18:23.099541 ignition[838]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:18:23.099541 ignition[838]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:18:23.099541 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:18:23.099541 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:18:23.099541 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:18:23.099541 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:18:23.099541 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:18:23.099541 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:18:23.099541 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:18:23.099541 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 14:18:23.098659 unknown[838]: wrote ssh authorized keys file for user: core Dec 13 14:18:23.441633 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Dec 13 14:18:23.832981 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:18:23.832981 ignition[838]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Dec 13 14:18:23.837329 ignition[838]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:18:23.837329 ignition[838]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:18:23.837329 ignition[838]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Dec 13 14:18:23.837329 ignition[838]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 14:18:23.837329 ignition[838]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:18:23.860946 ignition[838]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:18:23.863517 ignition[838]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 14:18:23.863517 ignition[838]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:18:23.863517 ignition[838]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:18:23.863517 ignition[838]: INFO : files: files passed Dec 13 14:18:23.863517 ignition[838]: INFO : Ignition finished successfully Dec 13 14:18:23.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.862579 systemd[1]: Finished ignition-files.service. Dec 13 14:18:23.864664 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:18:23.866000 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:18:23.877607 initrd-setup-root-after-ignition[862]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 14:18:23.866973 systemd[1]: Starting ignition-quench.service... Dec 13 14:18:23.880110 initrd-setup-root-after-ignition[865]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:18:23.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.870334 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:18:23.870430 systemd[1]: Finished ignition-quench.service. Dec 13 14:18:23.880015 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:18:23.880831 systemd[1]: Reached target ignition-complete.target. Dec 13 14:18:23.884354 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:18:23.900797 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:18:23.900934 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:18:23.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.901786 systemd[1]: Reached target initrd-fs.target. Dec 13 14:18:23.904909 systemd[1]: Reached target initrd.target. Dec 13 14:18:23.905658 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:18:23.907880 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:18:23.918839 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:18:23.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.920529 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:18:23.931695 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:18:23.932280 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:18:23.933826 systemd[1]: Stopped target timers.target. Dec 13 14:18:23.934132 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:18:23.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.934262 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:18:23.934651 systemd-networkd[720]: eth0: Gained IPv6LL Dec 13 14:18:23.937210 systemd[1]: Stopped target initrd.target. Dec 13 14:18:23.938849 systemd[1]: Stopped target basic.target. Dec 13 14:18:23.940582 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:18:23.941097 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:18:23.941428 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:18:23.944719 systemd[1]: Stopped target remote-fs.target. Dec 13 14:18:23.946136 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:18:23.946627 systemd[1]: Stopped target sysinit.target. Dec 13 14:18:23.949102 systemd[1]: Stopped target local-fs.target. Dec 13 14:18:23.950659 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:18:23.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.952111 systemd[1]: Stopped target swap.target. Dec 13 14:18:23.952437 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:18:23.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.952567 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:18:23.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.954933 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:18:23.956325 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:18:23.956440 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:18:23.957806 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:18:23.957899 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:18:23.959495 systemd[1]: Stopped target paths.target. Dec 13 14:18:23.960898 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:18:23.964429 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:18:23.966447 systemd[1]: Stopped target slices.target. Dec 13 14:18:23.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.966795 systemd[1]: Stopped target sockets.target. Dec 13 14:18:23.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.967176 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:18:23.974972 iscsid[735]: iscsid shutting down. Dec 13 14:18:23.967258 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:18:23.970794 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:18:23.970869 systemd[1]: Stopped ignition-files.service. Dec 13 14:18:23.972994 systemd[1]: Stopping ignition-mount.service... Dec 13 14:18:23.974933 systemd[1]: Stopping iscsid.service... Dec 13 14:18:23.980723 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:18:23.982525 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:18:23.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.985083 ignition[878]: INFO : Ignition 2.14.0 Dec 13 14:18:23.985083 ignition[878]: INFO : Stage: umount Dec 13 14:18:23.985083 ignition[878]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 14:18:23.985083 ignition[878]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 14:18:23.985083 ignition[878]: INFO : umount: umount passed Dec 13 14:18:23.985083 ignition[878]: INFO : Ignition finished successfully Dec 13 14:18:23.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.982631 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:18:23.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.983186 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:18:23.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.983264 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:18:23.986819 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:18:23.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.986900 systemd[1]: Stopped iscsid.service. Dec 13 14:18:23.988075 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:18:23.988140 systemd[1]: Stopped ignition-mount.service. Dec 13 14:18:23.989617 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:18:23.989681 systemd[1]: Closed iscsid.socket. Dec 13 14:18:23.991129 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:18:23.991161 systemd[1]: Stopped ignition-disks.service. Dec 13 14:18:24.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:23.993659 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:18:23.993690 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:18:23.994222 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:18:23.994249 systemd[1]: Stopped ignition-setup.service. Dec 13 14:18:23.996636 systemd[1]: Stopping iscsiuio.service... Dec 13 14:18:24.001660 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:18:24.003184 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:18:24.012132 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:18:24.013295 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:18:24.014294 systemd[1]: Stopped iscsiuio.service. Dec 13 14:18:24.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.016422 systemd[1]: Stopped target network.target. Dec 13 14:18:24.017971 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:18:24.018800 systemd[1]: Closed iscsiuio.socket. Dec 13 14:18:24.020197 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:18:24.021958 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:18:24.024424 systemd-networkd[720]: eth0: DHCPv6 lease lost Dec 13 14:18:24.025665 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:18:24.026934 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:18:24.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.029603 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:18:24.029645 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:18:24.031000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:18:24.033626 systemd[1]: Stopping network-cleanup.service... Dec 13 14:18:24.034583 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:18:24.035573 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:18:24.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.038751 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:18:24.038794 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:18:24.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.041909 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:18:24.043243 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:18:24.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.045325 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:18:24.047579 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:18:24.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.047993 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:18:24.048072 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:18:24.056194 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:18:24.056300 systemd[1]: Stopped network-cleanup.service. Dec 13 14:18:24.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.059000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:18:24.060763 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:18:24.060896 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:18:24.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.064148 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:18:24.064201 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:18:24.065984 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:18:24.066020 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:18:24.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.067671 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:18:24.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.067720 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:18:24.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.068307 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:18:24.068349 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:18:24.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.070751 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:18:24.070794 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:18:24.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.073207 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:18:24.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.073753 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:18:24.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.073934 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:18:24.076776 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:18:24.076820 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:18:24.078601 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:18:24.078647 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:18:24.080235 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:18:24.080726 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:18:24.080816 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:18:24.089812 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:18:24.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.089906 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:18:24.090719 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:18:24.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.092678 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:18:24.092715 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:18:24.094938 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:18:24.111958 systemd[1]: Switching root. Dec 13 14:18:24.131140 systemd-journald[198]: Journal stopped Dec 13 14:18:27.962978 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). Dec 13 14:18:27.963043 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:18:27.963070 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:18:27.963087 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:18:27.963101 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:18:27.963123 kernel: SELinux: policy capability open_perms=1 Dec 13 14:18:27.963137 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:18:27.963150 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:18:27.963168 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:18:27.963181 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:18:27.963194 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:18:27.963220 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:18:27.963233 kernel: kauditd_printk_skb: 66 callbacks suppressed Dec 13 14:18:27.963246 kernel: audit: type=1403 audit(1734099504.189:77): auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:18:27.963267 systemd[1]: Successfully loaded SELinux policy in 39.500ms. Dec 13 14:18:27.963287 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.145ms. Dec 13 14:18:27.963302 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:18:27.963321 systemd[1]: Detected virtualization kvm. Dec 13 14:18:27.963335 systemd[1]: Detected architecture x86-64. Dec 13 14:18:27.963348 systemd[1]: Detected first boot. Dec 13 14:18:27.963384 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:18:27.963400 kernel: audit: type=1400 audit(1734099504.329:78): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:18:27.963420 kernel: audit: type=1400 audit(1734099504.329:79): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:18:27.963434 kernel: audit: type=1334 audit(1734099504.336:80): prog-id=10 op=LOAD Dec 13 14:18:27.963447 kernel: audit: type=1334 audit(1734099504.336:81): prog-id=10 op=UNLOAD Dec 13 14:18:27.963460 kernel: audit: type=1334 audit(1734099504.338:82): prog-id=11 op=LOAD Dec 13 14:18:27.963474 kernel: audit: type=1334 audit(1734099504.338:83): prog-id=11 op=UNLOAD Dec 13 14:18:27.963487 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:18:27.963502 kernel: audit: type=1400 audit(1734099504.373:84): avc: denied { associate } for pid=911 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:18:27.963523 kernel: audit: type=1300 audit(1734099504.373:84): arch=c000003e syscall=188 success=yes exit=0 a0=c0001cd8b2 a1=c000150de0 a2=c0001590c0 a3=32 items=0 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.963538 kernel: audit: type=1327 audit(1734099504.373:84): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:18:27.963552 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:18:27.963567 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:18:27.963581 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:18:27.963598 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:18:27.963618 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:18:27.963633 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:18:27.963647 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:18:27.963662 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:18:27.963676 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:18:27.963690 systemd[1]: Created slice system-getty.slice. Dec 13 14:18:27.963704 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:18:27.963724 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:18:27.963739 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:18:27.963754 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:18:27.963767 systemd[1]: Created slice user.slice. Dec 13 14:18:27.963781 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:18:27.963803 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:18:27.963826 systemd[1]: Set up automount boot.automount. Dec 13 14:18:27.963848 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:18:27.963863 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:18:27.963877 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:18:27.963891 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:18:27.963908 systemd[1]: Reached target integritysetup.target. Dec 13 14:18:27.963924 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:18:27.963938 systemd[1]: Reached target remote-fs.target. Dec 13 14:18:27.963952 systemd[1]: Reached target slices.target. Dec 13 14:18:27.963972 systemd[1]: Reached target swap.target. Dec 13 14:18:27.963987 systemd[1]: Reached target torcx.target. Dec 13 14:18:27.964001 systemd[1]: Reached target veritysetup.target. Dec 13 14:18:27.964015 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:18:27.964029 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:18:27.964043 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:18:27.964057 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:18:27.964071 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:18:27.964085 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:18:27.964105 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:18:27.964122 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:18:27.964142 systemd[1]: Mounting media.mount... Dec 13 14:18:27.964156 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:18:27.964170 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:18:27.964185 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:18:27.964199 systemd[1]: Mounting tmp.mount... Dec 13 14:18:27.964213 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:18:27.964227 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:18:27.964248 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:18:27.964263 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:18:27.964277 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:18:27.964292 systemd[1]: Starting modprobe@drm.service... Dec 13 14:18:27.964307 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:18:27.964321 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:18:27.964335 systemd[1]: Starting modprobe@loop.service... Dec 13 14:18:27.964350 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:18:27.964390 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:18:27.964412 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:18:27.964427 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:18:27.964441 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:18:27.964456 systemd[1]: Stopped systemd-journald.service. Dec 13 14:18:27.964470 kernel: fuse: init (API version 7.34) Dec 13 14:18:27.964484 systemd[1]: Starting systemd-journald.service... Dec 13 14:18:27.964498 kernel: loop: module loaded Dec 13 14:18:27.964511 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:18:27.964525 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:18:27.964545 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:18:27.964560 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:18:27.964577 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:18:27.964591 systemd[1]: Stopped verity-setup.service. Dec 13 14:18:27.964606 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:18:27.964620 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:18:27.964634 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:18:27.964650 systemd[1]: Mounted media.mount. Dec 13 14:18:27.964663 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:18:27.964676 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:18:27.964699 systemd-journald[988]: Journal started Dec 13 14:18:27.964759 systemd-journald[988]: Runtime Journal (/run/log/journal/549a9e8ac6104c01bad72ce5437b1cac) is 6.0M, max 48.5M, 42.5M free. Dec 13 14:18:24.189000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:18:24.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:18:24.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:18:24.336000 audit: BPF prog-id=10 op=LOAD Dec 13 14:18:24.336000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:18:24.338000 audit: BPF prog-id=11 op=LOAD Dec 13 14:18:24.338000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:18:24.373000 audit[911]: AVC avc: denied { associate } for pid=911 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:18:24.373000 audit[911]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001cd8b2 a1=c000150de0 a2=c0001590c0 a3=32 items=0 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:24.373000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:18:24.375000 audit[911]: AVC avc: denied { associate } for pid=911 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:18:24.375000 audit[911]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001cd989 a2=1ed a3=0 items=2 ppid=894 pid=911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:24.375000 audit: CWD cwd="/" Dec 13 14:18:24.375000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:24.375000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:24.375000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:18:27.787000 audit: BPF prog-id=12 op=LOAD Dec 13 14:18:27.787000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:18:27.787000 audit: BPF prog-id=13 op=LOAD Dec 13 14:18:27.788000 audit: BPF prog-id=14 op=LOAD Dec 13 14:18:27.788000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:18:27.788000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:18:27.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.801000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:18:27.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.900000 audit: BPF prog-id=15 op=LOAD Dec 13 14:18:27.901000 audit: BPF prog-id=16 op=LOAD Dec 13 14:18:27.901000 audit: BPF prog-id=17 op=LOAD Dec 13 14:18:27.901000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:18:27.901000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:18:27.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.961000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:18:27.961000 audit[988]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffe73818920 a2=4000 a3=7ffe738189bc items=0 ppid=1 pid=988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:27.961000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:18:27.786008 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:18:24.372664 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:18:27.786020 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 14:18:24.372944 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:24Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:18:27.789078 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:18:24.372965 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:24Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:18:24.373000 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:24Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:18:24.373014 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:24Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:18:24.373048 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:24Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:18:24.373064 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:24Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:18:24.373299 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:24Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:18:24.373341 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:24Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:18:27.967377 systemd[1]: Started systemd-journald.service. Dec 13 14:18:24.373377 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:24Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:18:24.373746 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:24Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:18:24.373788 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:24Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:18:27.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:24.373811 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:24Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:18:24.373830 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:24Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:18:24.373853 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:24Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:18:27.968099 systemd[1]: Mounted tmp.mount. Dec 13 14:18:24.373872 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:24Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:18:27.475045 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:27Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:18:27.475403 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:27Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:18:27.475542 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:27Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:18:27.475710 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:27Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:18:27.475767 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:27Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:18:27.475841 /usr/lib/systemd/system-generators/torcx-generator[911]: time="2024-12-13T14:18:27Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:18:27.969075 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:18:27.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.970132 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:18:27.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.971163 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:18:27.971326 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:18:27.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.972392 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:18:27.972559 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:18:27.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.973614 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:18:27.973815 systemd[1]: Finished modprobe@drm.service. Dec 13 14:18:27.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.974826 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:18:27.975031 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:18:27.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.976137 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:18:27.976274 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:18:27.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.977302 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:18:27.977530 systemd[1]: Finished modprobe@loop.service. Dec 13 14:18:27.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.978610 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:18:27.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.980172 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:18:27.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.981684 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:18:27.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:27.983313 systemd[1]: Reached target network-pre.target. Dec 13 14:18:27.985872 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:18:27.987933 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:18:27.988842 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:18:27.990621 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:18:27.992552 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:18:27.993456 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:18:27.994315 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:18:27.995274 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:18:27.996399 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:18:27.998917 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:18:28.000882 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:18:28.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:28.015229 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:18:28.016303 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:18:28.018648 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:18:28.034324 udevadm[1014]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 14:18:28.035488 systemd-journald[988]: Time spent on flushing to /var/log/journal/549a9e8ac6104c01bad72ce5437b1cac is 18.013ms for 1087 entries. Dec 13 14:18:28.035488 systemd-journald[988]: System Journal (/var/log/journal/549a9e8ac6104c01bad72ce5437b1cac) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:18:28.061487 systemd-journald[988]: Received client request to flush runtime journal. Dec 13 14:18:28.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:28.051329 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:18:28.052461 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:18:28.062408 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:18:28.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:28.090452 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:18:28.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:28.091659 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:18:28.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:28.093614 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:18:28.114608 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:18:28.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:28.673704 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:18:28.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:28.675000 audit: BPF prog-id=18 op=LOAD Dec 13 14:18:28.675000 audit: BPF prog-id=19 op=LOAD Dec 13 14:18:28.675000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:18:28.675000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:18:28.676095 systemd[1]: Starting systemd-udevd.service... Dec 13 14:18:28.692844 systemd-udevd[1019]: Using default interface naming scheme 'v252'. Dec 13 14:18:28.707392 systemd[1]: Started systemd-udevd.service. Dec 13 14:18:28.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:28.710000 audit: BPF prog-id=20 op=LOAD Dec 13 14:18:28.712103 systemd[1]: Starting systemd-networkd.service... Dec 13 14:18:28.716000 audit: BPF prog-id=21 op=LOAD Dec 13 14:18:28.716000 audit: BPF prog-id=22 op=LOAD Dec 13 14:18:28.716000 audit: BPF prog-id=23 op=LOAD Dec 13 14:18:28.717471 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:18:28.745372 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:18:28.749859 systemd[1]: Started systemd-userdbd.service. Dec 13 14:18:28.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:28.759127 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:18:28.790406 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:18:28.788000 audit[1026]: AVC avc: denied { confidentiality } for pid=1026 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:18:28.788000 audit[1026]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d4de502ac0 a1=337fc a2=7fa79f374bc5 a3=5 items=110 ppid=1019 pid=1026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:28.788000 audit: CWD cwd="/" Dec 13 14:18:28.788000 audit: PATH item=0 name=(null) inode=1040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=1 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=2 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=3 name=(null) inode=14101 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=4 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=5 name=(null) inode=14102 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=6 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=7 name=(null) inode=14103 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=8 name=(null) inode=14103 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=9 name=(null) inode=14104 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=10 name=(null) inode=14103 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=11 name=(null) inode=14105 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=12 name=(null) inode=14103 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=13 name=(null) inode=14106 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=14 name=(null) inode=14103 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=15 name=(null) inode=14107 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=16 name=(null) inode=14103 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=17 name=(null) inode=14108 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=18 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=19 name=(null) inode=14109 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=20 name=(null) inode=14109 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=21 name=(null) inode=14110 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=22 name=(null) inode=14109 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=23 name=(null) inode=14111 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=24 name=(null) inode=14109 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=25 name=(null) inode=14112 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=26 name=(null) inode=14109 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=27 name=(null) inode=14113 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=28 name=(null) inode=14109 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=29 name=(null) inode=14114 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=30 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=31 name=(null) inode=14115 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=32 name=(null) inode=14115 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=33 name=(null) inode=14116 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=34 name=(null) inode=14115 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=35 name=(null) inode=14117 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=36 name=(null) inode=14115 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=37 name=(null) inode=14118 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=38 name=(null) inode=14115 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=39 name=(null) inode=14119 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=40 name=(null) inode=14115 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=41 name=(null) inode=14120 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=42 name=(null) inode=14100 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=43 name=(null) inode=14121 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=44 name=(null) inode=14121 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=45 name=(null) inode=14122 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=46 name=(null) inode=14121 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=47 name=(null) inode=14123 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=48 name=(null) inode=14121 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=49 name=(null) inode=14124 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=50 name=(null) inode=14121 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=51 name=(null) inode=14125 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=52 name=(null) inode=14121 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=53 name=(null) inode=14126 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=54 name=(null) inode=1040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=55 name=(null) inode=14127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=56 name=(null) inode=14127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=57 name=(null) inode=14128 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=58 name=(null) inode=14127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=59 name=(null) inode=14129 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=60 name=(null) inode=14127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=61 name=(null) inode=14130 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=62 name=(null) inode=14130 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=63 name=(null) inode=14131 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=64 name=(null) inode=14130 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=65 name=(null) inode=14132 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=66 name=(null) inode=14130 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=67 name=(null) inode=14133 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=68 name=(null) inode=14130 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=69 name=(null) inode=14134 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=70 name=(null) inode=14130 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=71 name=(null) inode=14135 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=72 name=(null) inode=14127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=73 name=(null) inode=14136 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=74 name=(null) inode=14136 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=75 name=(null) inode=14137 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=76 name=(null) inode=14136 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=77 name=(null) inode=14138 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=78 name=(null) inode=14136 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=79 name=(null) inode=14139 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=80 name=(null) inode=14136 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=81 name=(null) inode=14140 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=82 name=(null) inode=14136 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=83 name=(null) inode=14141 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=84 name=(null) inode=14127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=85 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=86 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=87 name=(null) inode=14143 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=88 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=89 name=(null) inode=14144 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=90 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=91 name=(null) inode=14145 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=92 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=93 name=(null) inode=14146 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=94 name=(null) inode=14142 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=95 name=(null) inode=14147 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=96 name=(null) inode=14127 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=97 name=(null) inode=14148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=98 name=(null) inode=14148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=99 name=(null) inode=14149 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=100 name=(null) inode=14148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=101 name=(null) inode=14150 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=102 name=(null) inode=14148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=103 name=(null) inode=14151 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=104 name=(null) inode=14148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=105 name=(null) inode=14152 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=106 name=(null) inode=14148 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=107 name=(null) inode=14153 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PATH item=109 name=(null) inode=14681 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:28.788000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:18:28.805379 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 14:18:28.815271 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 14:18:28.815415 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:18:28.815434 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 14:18:28.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:28.806197 systemd-networkd[1031]: lo: Link UP Dec 13 14:18:28.806201 systemd-networkd[1031]: lo: Gained carrier Dec 13 14:18:28.806614 systemd-networkd[1031]: Enumeration completed Dec 13 14:18:28.806772 systemd-networkd[1031]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:18:28.806939 systemd[1]: Started systemd-networkd.service. Dec 13 14:18:28.815782 systemd-networkd[1031]: eth0: Link UP Dec 13 14:18:28.815788 systemd-networkd[1031]: eth0: Gained carrier Dec 13 14:18:28.827471 systemd-networkd[1031]: eth0: DHCPv4 address 10.0.0.25/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 14:18:28.833446 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 14:18:28.840422 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:18:28.932877 kernel: kvm: Nested Virtualization enabled Dec 13 14:18:28.932989 kernel: SVM: kvm: Nested Paging enabled Dec 13 14:18:28.934270 kernel: SVM: Virtual VMLOAD VMSAVE supported Dec 13 14:18:28.934305 kernel: SVM: Virtual GIF supported Dec 13 14:18:28.950382 kernel: EDAC MC: Ver: 3.0.0 Dec 13 14:18:28.976795 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:18:28.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:28.978966 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:18:28.986536 lvm[1054]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:18:29.016608 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:18:29.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.017713 systemd[1]: Reached target cryptsetup.target. Dec 13 14:18:29.019705 systemd[1]: Starting lvm2-activation.service... Dec 13 14:18:29.023114 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:18:29.047108 systemd[1]: Finished lvm2-activation.service. Dec 13 14:18:29.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.048139 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:18:29.049037 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:18:29.049062 systemd[1]: Reached target local-fs.target. Dec 13 14:18:29.049914 systemd[1]: Reached target machines.target. Dec 13 14:18:29.051991 systemd[1]: Starting ldconfig.service... Dec 13 14:18:29.053088 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:18:29.053151 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:18:29.054161 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:18:29.056263 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:18:29.058303 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:18:29.060160 systemd[1]: Starting systemd-sysext.service... Dec 13 14:18:29.061167 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1057 (bootctl) Dec 13 14:18:29.062020 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:18:29.072153 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:18:29.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.073915 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:18:29.077801 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:18:29.078005 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:18:29.090387 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 14:18:29.100888 systemd-fsck[1065]: fsck.fat 4.2 (2021-01-31) Dec 13 14:18:29.100888 systemd-fsck[1065]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 14:18:29.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.103750 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:18:29.108353 systemd[1]: Mounting boot.mount... Dec 13 14:18:29.120615 systemd[1]: Mounted boot.mount. Dec 13 14:18:29.228066 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:18:29.229157 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:18:29.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.230930 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:18:29.231627 kernel: kauditd_printk_skb: 184 callbacks suppressed Dec 13 14:18:29.231681 kernel: audit: type=1130 audit(1734099509.230:149): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.241377 kernel: audit: type=1130 audit(1734099509.237:150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.241437 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:18:29.256381 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 14:18:29.260992 (sd-sysext)[1070]: Using extensions 'kubernetes'. Dec 13 14:18:29.261333 (sd-sysext)[1070]: Merged extensions into '/usr'. Dec 13 14:18:29.276953 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:18:29.278527 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:18:29.280391 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:18:29.281633 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:18:29.283524 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:18:29.285144 systemd[1]: Starting modprobe@loop.service... Dec 13 14:18:29.318567 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:18:29.318791 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:18:29.318960 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:18:29.321429 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:18:29.322494 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:18:29.322622 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:18:29.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.323789 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:18:29.323898 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:18:29.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.327389 kernel: audit: type=1130 audit(1734099509.323:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.327495 kernel: audit: type=1131 audit(1734099509.323:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.332215 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:18:29.332324 systemd[1]: Finished modprobe@loop.service. Dec 13 14:18:29.335175 ldconfig[1056]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:18:29.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.339020 kernel: audit: type=1130 audit(1734099509.331:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.339077 kernel: audit: type=1131 audit(1734099509.331:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.340197 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:18:29.340286 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:18:29.341120 systemd[1]: Finished ldconfig.service. Dec 13 14:18:29.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.343380 kernel: audit: type=1130 audit(1734099509.339:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.343416 kernel: audit: type=1131 audit(1734099509.339:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.347302 systemd[1]: Finished systemd-sysext.service. Dec 13 14:18:29.350846 kernel: audit: type=1130 audit(1734099509.346:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.352233 systemd[1]: Starting ensure-sysext.service... Dec 13 14:18:29.354378 kernel: audit: type=1130 audit(1734099509.350:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.355696 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:18:29.358242 systemd[1]: Reloading. Dec 13 14:18:29.367159 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:18:29.367956 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:18:29.369705 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:18:29.410692 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-12-13T14:18:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:18:29.411057 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-12-13T14:18:29Z" level=info msg="torcx already run" Dec 13 14:18:29.473751 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:18:29.473765 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:18:29.490524 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:18:29.539000 audit: BPF prog-id=24 op=LOAD Dec 13 14:18:29.539000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:18:29.539000 audit: BPF prog-id=25 op=LOAD Dec 13 14:18:29.539000 audit: BPF prog-id=26 op=LOAD Dec 13 14:18:29.539000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:18:29.539000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:18:29.541000 audit: BPF prog-id=27 op=LOAD Dec 13 14:18:29.541000 audit: BPF prog-id=28 op=LOAD Dec 13 14:18:29.541000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:18:29.541000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:18:29.542000 audit: BPF prog-id=29 op=LOAD Dec 13 14:18:29.542000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:18:29.542000 audit: BPF prog-id=30 op=LOAD Dec 13 14:18:29.542000 audit: BPF prog-id=31 op=LOAD Dec 13 14:18:29.542000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:18:29.542000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:18:29.543000 audit: BPF prog-id=32 op=LOAD Dec 13 14:18:29.543000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:18:29.545669 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:18:29.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.549985 systemd[1]: Starting audit-rules.service... Dec 13 14:18:29.551864 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:18:29.553944 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:18:29.555000 audit: BPF prog-id=33 op=LOAD Dec 13 14:18:29.557000 audit: BPF prog-id=34 op=LOAD Dec 13 14:18:29.556728 systemd[1]: Starting systemd-resolved.service... Dec 13 14:18:29.559262 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:18:29.561601 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:18:29.563167 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:18:29.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.565000 audit[1148]: SYSTEM_BOOT pid=1148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.570283 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:18:29.571998 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:18:29.574244 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:18:29.576536 systemd[1]: Starting modprobe@loop.service... Dec 13 14:18:29.577351 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:18:29.577519 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:18:29.577740 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:18:29.579488 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:18:29.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.581093 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:18:29.582447 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:18:29.582577 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:18:29.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.583879 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:18:29.584028 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:18:29.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.585275 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:18:29.585418 systemd[1]: Finished modprobe@loop.service. Dec 13 14:18:29.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:29.587538 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:18:29.587657 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:18:29.589168 systemd[1]: Starting systemd-update-done.service... Dec 13 14:18:29.592328 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:18:29.593982 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:18:29.596659 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:18:29.626000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:18:29.626000 audit[1164]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc9f3e9890 a2=420 a3=0 items=0 ppid=1138 pid=1164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:29.626592 augenrules[1164]: No rules Dec 13 14:18:29.626000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:18:29.643306 systemd[1]: Starting modprobe@loop.service... Dec 13 14:18:29.644226 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:18:29.644444 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:18:29.644664 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:18:29.646056 systemd[1]: Finished audit-rules.service. Dec 13 14:18:29.647241 systemd[1]: Finished systemd-update-done.service. Dec 13 14:18:29.648479 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:18:29.648608 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:18:29.649830 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:18:29.649949 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:18:29.651256 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:18:29.651416 systemd[1]: Finished modprobe@loop.service. Dec 13 14:18:29.652718 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:18:29.652864 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:18:29.656201 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:18:30.784851 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:18:30.784873 systemd-timesyncd[1145]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 14:18:30.784924 systemd-timesyncd[1145]: Initial clock synchronization to Fri 2024-12-13 14:18:30.784776 UTC. Dec 13 14:18:30.785338 systemd-resolved[1144]: Positive Trust Anchors: Dec 13 14:18:30.785346 systemd-resolved[1144]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:18:30.785372 systemd-resolved[1144]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:18:30.786832 systemd[1]: Starting modprobe@drm.service... Dec 13 14:18:30.788658 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:18:30.790685 systemd[1]: Starting modprobe@loop.service... Dec 13 14:18:30.791626 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:18:30.791776 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:18:30.793007 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:18:30.794066 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:18:30.795005 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:18:30.796755 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:18:30.796893 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:18:30.798221 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:18:30.798347 systemd[1]: Finished modprobe@drm.service. Dec 13 14:18:30.799647 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:18:30.799773 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:18:30.800112 systemd-resolved[1144]: Defaulting to hostname 'linux'. Dec 13 14:18:30.801157 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:18:30.801309 systemd[1]: Finished modprobe@loop.service. Dec 13 14:18:30.802357 systemd[1]: Started systemd-resolved.service. Dec 13 14:18:30.803764 systemd[1]: Reached target network.target. Dec 13 14:18:30.804635 systemd[1]: Reached target nss-lookup.target. Dec 13 14:18:30.805491 systemd[1]: Reached target time-set.target. Dec 13 14:18:30.806350 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:18:30.806379 systemd[1]: Reached target sysinit.target. Dec 13 14:18:30.807287 systemd[1]: Started motdgen.path. Dec 13 14:18:30.808183 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:18:30.809683 systemd[1]: Started logrotate.timer. Dec 13 14:18:30.810638 systemd[1]: Started mdadm.timer. Dec 13 14:18:30.811477 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:18:30.812541 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:18:30.812575 systemd[1]: Reached target paths.target. Dec 13 14:18:30.813535 systemd[1]: Reached target timers.target. Dec 13 14:18:30.814693 systemd[1]: Listening on dbus.socket. Dec 13 14:18:30.816466 systemd[1]: Starting docker.socket... Dec 13 14:18:30.819797 systemd[1]: Listening on sshd.socket. Dec 13 14:18:30.820805 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:18:30.820867 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:18:30.821395 systemd[1]: Finished ensure-sysext.service. Dec 13 14:18:30.822585 systemd[1]: Listening on docker.socket. Dec 13 14:18:30.824194 systemd[1]: Reached target sockets.target. Dec 13 14:18:30.825196 systemd[1]: Reached target basic.target. Dec 13 14:18:30.826174 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:18:30.826204 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:18:30.827074 systemd[1]: Starting containerd.service... Dec 13 14:18:30.828942 systemd[1]: Starting dbus.service... Dec 13 14:18:30.830760 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:18:30.832742 systemd[1]: Starting extend-filesystems.service... Dec 13 14:18:30.833828 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:18:30.835055 systemd[1]: Starting motdgen.service... Dec 13 14:18:30.837539 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:18:30.839890 systemd[1]: Starting sshd-keygen.service... Dec 13 14:18:30.843385 systemd[1]: Starting systemd-logind.service... Dec 13 14:18:30.844923 jq[1181]: false Dec 13 14:18:30.844352 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:18:30.844438 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:18:30.844885 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:18:30.845692 systemd[1]: Starting update-engine.service... Dec 13 14:18:30.848106 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:18:30.853749 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:18:30.853949 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:18:30.855954 jq[1195]: true Dec 13 14:18:30.857057 systemd[1]: Started dbus.service. Dec 13 14:18:30.856884 dbus-daemon[1180]: [system] SELinux support is enabled Dec 13 14:18:30.860705 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:18:30.860880 systemd[1]: Finished motdgen.service. Dec 13 14:18:30.862072 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:18:30.862112 systemd[1]: Reached target system-config.target. Dec 13 14:18:30.863241 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:18:30.863260 systemd[1]: Reached target user-config.target. Dec 13 14:18:30.869218 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:18:30.869691 jq[1198]: true Dec 13 14:18:30.882675 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:18:30.895771 extend-filesystems[1182]: Found loop1 Dec 13 14:18:30.897363 extend-filesystems[1182]: Found sr0 Dec 13 14:18:30.897363 extend-filesystems[1182]: Found vda Dec 13 14:18:30.897363 extend-filesystems[1182]: Found vda1 Dec 13 14:18:30.897363 extend-filesystems[1182]: Found vda2 Dec 13 14:18:30.897363 extend-filesystems[1182]: Found vda3 Dec 13 14:18:30.897363 extend-filesystems[1182]: Found usr Dec 13 14:18:30.897363 extend-filesystems[1182]: Found vda4 Dec 13 14:18:30.897363 extend-filesystems[1182]: Found vda6 Dec 13 14:18:30.897363 extend-filesystems[1182]: Found vda7 Dec 13 14:18:30.897363 extend-filesystems[1182]: Found vda9 Dec 13 14:18:30.897363 extend-filesystems[1182]: Checking size of /dev/vda9 Dec 13 14:18:30.916177 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 14:18:30.916215 extend-filesystems[1182]: Resized partition /dev/vda9 Dec 13 14:18:30.917993 extend-filesystems[1216]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:18:30.935438 update_engine[1194]: I1213 14:18:30.924989 1194 main.cc:92] Flatcar Update Engine starting Dec 13 14:18:30.935438 update_engine[1194]: I1213 14:18:30.931092 1194 update_check_scheduler.cc:74] Next update check in 12m0s Dec 13 14:18:30.929880 systemd[1]: Started update-engine.service. Dec 13 14:18:30.932747 systemd[1]: Started locksmithd.service. Dec 13 14:18:30.951200 systemd-logind[1191]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:18:30.951487 env[1197]: time="2024-12-13T14:18:30.951144173Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:18:30.951237 systemd-logind[1191]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:18:30.952338 systemd-logind[1191]: New seat seat0. Dec 13 14:18:30.956966 systemd[1]: Started systemd-logind.service. Dec 13 14:18:30.999449 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 14:18:31.003356 env[1197]: time="2024-12-13T14:18:31.003281479Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:18:31.029311 env[1197]: time="2024-12-13T14:18:31.029218491Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:18:31.029633 extend-filesystems[1216]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 14:18:31.029633 extend-filesystems[1216]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:18:31.029633 extend-filesystems[1216]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 14:18:31.037564 extend-filesystems[1182]: Resized filesystem in /dev/vda9 Dec 13 14:18:31.038866 bash[1228]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:18:31.030712 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:18:31.039048 env[1197]: time="2024-12-13T14:18:31.031382679Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:18:31.039048 env[1197]: time="2024-12-13T14:18:31.031447330Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:18:31.039048 env[1197]: time="2024-12-13T14:18:31.031808558Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:18:31.039048 env[1197]: time="2024-12-13T14:18:31.031826982Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:18:31.039048 env[1197]: time="2024-12-13T14:18:31.031852400Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:18:31.039048 env[1197]: time="2024-12-13T14:18:31.031866667Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:18:31.039048 env[1197]: time="2024-12-13T14:18:31.032492220Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:18:31.039048 env[1197]: time="2024-12-13T14:18:31.032882632Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:18:31.039048 env[1197]: time="2024-12-13T14:18:31.033038875Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:18:31.039048 env[1197]: time="2024-12-13T14:18:31.033063081Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:18:31.030898 systemd[1]: Finished extend-filesystems.service. Dec 13 14:18:31.040086 env[1197]: time="2024-12-13T14:18:31.033268185Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:18:31.040086 env[1197]: time="2024-12-13T14:18:31.033282161Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:18:31.040086 env[1197]: time="2024-12-13T14:18:31.039494792Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:18:31.040086 env[1197]: time="2024-12-13T14:18:31.039538855Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:18:31.040086 env[1197]: time="2024-12-13T14:18:31.039570164Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:18:31.040086 env[1197]: time="2024-12-13T14:18:31.039636769Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:18:31.040086 env[1197]: time="2024-12-13T14:18:31.039655784Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:18:31.040086 env[1197]: time="2024-12-13T14:18:31.039670602Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:18:31.040086 env[1197]: time="2024-12-13T14:18:31.039682274Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:18:31.040086 env[1197]: time="2024-12-13T14:18:31.039697342Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:18:31.040086 env[1197]: time="2024-12-13T14:18:31.039709104Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:18:31.040086 env[1197]: time="2024-12-13T14:18:31.039723211Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:18:31.040086 env[1197]: time="2024-12-13T14:18:31.039743158Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:18:31.040086 env[1197]: time="2024-12-13T14:18:31.039764107Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:18:31.035508 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:18:31.040459 env[1197]: time="2024-12-13T14:18:31.039910181Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:18:31.040459 env[1197]: time="2024-12-13T14:18:31.040022221Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:18:31.040739 env[1197]: time="2024-12-13T14:18:31.040688110Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:18:31.040821 env[1197]: time="2024-12-13T14:18:31.040778530Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:18:31.040894 env[1197]: time="2024-12-13T14:18:31.040826710Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:18:31.041025 env[1197]: time="2024-12-13T14:18:31.040992010Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:18:31.041168 env[1197]: time="2024-12-13T14:18:31.041020133Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:18:31.041215 env[1197]: time="2024-12-13T14:18:31.041186244Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:18:31.041241 env[1197]: time="2024-12-13T14:18:31.041216251Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:18:31.041241 env[1197]: time="2024-12-13T14:18:31.041233733Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:18:31.041313 env[1197]: time="2024-12-13T14:18:31.041259442Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:18:31.041313 env[1197]: time="2024-12-13T14:18:31.041285921Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:18:31.041313 env[1197]: time="2024-12-13T14:18:31.041303434Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:18:31.041563 env[1197]: time="2024-12-13T14:18:31.041323462Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:18:31.041563 env[1197]: time="2024-12-13T14:18:31.041554986Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:18:31.041861 env[1197]: time="2024-12-13T14:18:31.041577508Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:18:31.041861 env[1197]: time="2024-12-13T14:18:31.041593709Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:18:31.041861 env[1197]: time="2024-12-13T14:18:31.041608486Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:18:31.041861 env[1197]: time="2024-12-13T14:18:31.041626460Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:18:31.041861 env[1197]: time="2024-12-13T14:18:31.041640346Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:18:31.041861 env[1197]: time="2024-12-13T14:18:31.041704777Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:18:31.041861 env[1197]: time="2024-12-13T14:18:31.041795447Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:18:31.042265 env[1197]: time="2024-12-13T14:18:31.042185579Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:18:31.044529 env[1197]: time="2024-12-13T14:18:31.042283021Z" level=info msg="Connect containerd service" Dec 13 14:18:31.044529 env[1197]: time="2024-12-13T14:18:31.042347152Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:18:31.044529 env[1197]: time="2024-12-13T14:18:31.043332610Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:18:31.044529 env[1197]: time="2024-12-13T14:18:31.043475848Z" level=info msg="Start subscribing containerd event" Dec 13 14:18:31.044529 env[1197]: time="2024-12-13T14:18:31.043565737Z" level=info msg="Start recovering state" Dec 13 14:18:31.044529 env[1197]: time="2024-12-13T14:18:31.043742749Z" level=info msg="Start event monitor" Dec 13 14:18:31.044529 env[1197]: time="2024-12-13T14:18:31.043795147Z" level=info msg="Start snapshots syncer" Dec 13 14:18:31.044529 env[1197]: time="2024-12-13T14:18:31.043813221Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:18:31.044529 env[1197]: time="2024-12-13T14:18:31.043823200Z" level=info msg="Start streaming server" Dec 13 14:18:31.044529 env[1197]: time="2024-12-13T14:18:31.044532780Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:18:31.044302 locksmithd[1229]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:18:31.046737 env[1197]: time="2024-12-13T14:18:31.044627889Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:18:31.044887 systemd[1]: Started containerd.service. Dec 13 14:18:31.047925 env[1197]: time="2024-12-13T14:18:31.047652481Z" level=info msg="containerd successfully booted in 0.098707s" Dec 13 14:18:31.206125 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:18:31.206210 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:18:31.525728 systemd-networkd[1031]: eth0: Gained IPv6LL Dec 13 14:18:31.527791 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:18:31.529255 systemd[1]: Reached target network-online.target. Dec 13 14:18:31.532253 systemd[1]: Starting kubelet.service... Dec 13 14:18:31.785422 sshd_keygen[1207]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:18:31.806001 systemd[1]: Finished sshd-keygen.service. Dec 13 14:18:31.808759 systemd[1]: Starting issuegen.service... Dec 13 14:18:31.813289 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:18:31.813433 systemd[1]: Finished issuegen.service. Dec 13 14:18:31.815931 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:18:31.823115 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:18:31.889697 systemd[1]: Started getty@tty1.service. Dec 13 14:18:31.892593 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:18:31.893799 systemd[1]: Reached target getty.target. Dec 13 14:18:32.713517 systemd[1]: Started kubelet.service. Dec 13 14:18:32.715282 systemd[1]: Reached target multi-user.target. Dec 13 14:18:32.717590 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:18:32.767492 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:18:32.767637 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:18:32.775961 systemd[1]: Startup finished in 799ms (kernel) + 4.280s (initrd) + 7.500s (userspace) = 12.580s. Dec 13 14:18:33.438581 kubelet[1257]: E1213 14:18:33.438497 1257 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:18:33.440136 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:18:33.440248 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:18:33.440559 systemd[1]: kubelet.service: Consumed 1.774s CPU time. Dec 13 14:18:40.767599 systemd[1]: Created slice system-sshd.slice. Dec 13 14:18:40.768578 systemd[1]: Started sshd@0-10.0.0.25:22-10.0.0.1:42710.service. Dec 13 14:18:40.806607 sshd[1267]: Accepted publickey for core from 10.0.0.1 port 42710 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:18:40.808037 sshd[1267]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:40.817371 systemd-logind[1191]: New session 1 of user core. Dec 13 14:18:40.818637 systemd[1]: Created slice user-500.slice. Dec 13 14:18:40.819920 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:18:40.828096 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:18:40.829667 systemd[1]: Starting user@500.service... Dec 13 14:18:40.832448 (systemd)[1270]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:40.896959 systemd[1270]: Queued start job for default target default.target. Dec 13 14:18:40.897344 systemd[1270]: Reached target paths.target. Dec 13 14:18:40.897359 systemd[1270]: Reached target sockets.target. Dec 13 14:18:40.897370 systemd[1270]: Reached target timers.target. Dec 13 14:18:40.897381 systemd[1270]: Reached target basic.target. Dec 13 14:18:40.897430 systemd[1270]: Reached target default.target. Dec 13 14:18:40.897453 systemd[1270]: Startup finished in 59ms. Dec 13 14:18:40.897536 systemd[1]: Started user@500.service. Dec 13 14:18:40.898772 systemd[1]: Started session-1.scope. Dec 13 14:18:40.950132 systemd[1]: Started sshd@1-10.0.0.25:22-10.0.0.1:42716.service. Dec 13 14:18:40.991811 sshd[1279]: Accepted publickey for core from 10.0.0.1 port 42716 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:18:40.993182 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:40.997274 systemd-logind[1191]: New session 2 of user core. Dec 13 14:18:40.998554 systemd[1]: Started session-2.scope. Dec 13 14:18:41.051457 sshd[1279]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:41.054290 systemd[1]: sshd@1-10.0.0.25:22-10.0.0.1:42716.service: Deactivated successfully. Dec 13 14:18:41.054835 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:18:41.055291 systemd-logind[1191]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:18:41.056495 systemd[1]: Started sshd@2-10.0.0.25:22-10.0.0.1:42730.service. Dec 13 14:18:41.057469 systemd-logind[1191]: Removed session 2. Dec 13 14:18:41.090536 sshd[1285]: Accepted publickey for core from 10.0.0.1 port 42730 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:18:41.091601 sshd[1285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:41.094692 systemd-logind[1191]: New session 3 of user core. Dec 13 14:18:41.095593 systemd[1]: Started session-3.scope. Dec 13 14:18:41.144806 sshd[1285]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:41.147230 systemd[1]: sshd@2-10.0.0.25:22-10.0.0.1:42730.service: Deactivated successfully. Dec 13 14:18:41.147809 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:18:41.148284 systemd-logind[1191]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:18:41.149251 systemd[1]: Started sshd@3-10.0.0.25:22-10.0.0.1:42734.service. Dec 13 14:18:41.150009 systemd-logind[1191]: Removed session 3. Dec 13 14:18:41.182904 sshd[1291]: Accepted publickey for core from 10.0.0.1 port 42734 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:18:41.184338 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:41.187508 systemd-logind[1191]: New session 4 of user core. Dec 13 14:18:41.188186 systemd[1]: Started session-4.scope. Dec 13 14:18:41.241520 sshd[1291]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:41.244973 systemd[1]: Started sshd@4-10.0.0.25:22-10.0.0.1:42748.service. Dec 13 14:18:41.245427 systemd[1]: sshd@3-10.0.0.25:22-10.0.0.1:42734.service: Deactivated successfully. Dec 13 14:18:41.245915 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:18:41.246323 systemd-logind[1191]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:18:41.247074 systemd-logind[1191]: Removed session 4. Dec 13 14:18:41.279729 sshd[1296]: Accepted publickey for core from 10.0.0.1 port 42748 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:18:41.280813 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:41.283790 systemd-logind[1191]: New session 5 of user core. Dec 13 14:18:41.284548 systemd[1]: Started session-5.scope. Dec 13 14:18:41.338098 sudo[1300]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:18:41.338308 sudo[1300]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:18:41.347600 dbus-daemon[1180]: \xd0\xddCe\u0013V: received setenforce notice (enforcing=-1051455200) Dec 13 14:18:41.349807 sudo[1300]: pam_unix(sudo:session): session closed for user root Dec 13 14:18:41.351597 sshd[1296]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:41.354235 systemd[1]: sshd@4-10.0.0.25:22-10.0.0.1:42748.service: Deactivated successfully. Dec 13 14:18:41.354799 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:18:41.355340 systemd-logind[1191]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:18:41.356334 systemd[1]: Started sshd@5-10.0.0.25:22-10.0.0.1:42756.service. Dec 13 14:18:41.357184 systemd-logind[1191]: Removed session 5. Dec 13 14:18:41.394301 sshd[1304]: Accepted publickey for core from 10.0.0.1 port 42756 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:18:41.396033 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:41.399547 systemd-logind[1191]: New session 6 of user core. Dec 13 14:18:41.400346 systemd[1]: Started session-6.scope. Dec 13 14:18:41.454983 sudo[1308]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:18:41.455157 sudo[1308]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:18:41.458516 sudo[1308]: pam_unix(sudo:session): session closed for user root Dec 13 14:18:41.463274 sudo[1307]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:18:41.463476 sudo[1307]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:18:41.472785 systemd[1]: Stopping audit-rules.service... Dec 13 14:18:41.472000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:18:41.474965 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:18:41.475002 kernel: audit: type=1305 audit(1734099521.472:191): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:18:41.475148 auditctl[1311]: No rules Dec 13 14:18:41.475445 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:18:41.475601 systemd[1]: Stopped audit-rules.service. Dec 13 14:18:41.472000 audit[1311]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffca8edfe0 a2=420 a3=0 items=0 ppid=1 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:41.477204 systemd[1]: Starting audit-rules.service... Dec 13 14:18:41.481600 kernel: audit: type=1300 audit(1734099521.472:191): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffca8edfe0 a2=420 a3=0 items=0 ppid=1 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:41.481762 kernel: audit: type=1327 audit(1734099521.472:191): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:18:41.472000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:18:41.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:41.486044 kernel: audit: type=1131 audit(1734099521.474:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:41.494606 augenrules[1328]: No rules Dec 13 14:18:41.495334 systemd[1]: Finished audit-rules.service. Dec 13 14:18:41.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:41.496318 sudo[1307]: pam_unix(sudo:session): session closed for user root Dec 13 14:18:41.494000 audit[1307]: USER_END pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:18:41.499728 sshd[1304]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:41.502028 systemd[1]: sshd@5-10.0.0.25:22-10.0.0.1:42756.service: Deactivated successfully. Dec 13 14:18:41.502723 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:18:41.503259 systemd-logind[1191]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:18:41.503805 kernel: audit: type=1130 audit(1734099521.494:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:41.504319 kernel: audit: type=1106 audit(1734099521.494:194): pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:18:41.504358 kernel: audit: type=1104 audit(1734099521.495:195): pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:18:41.495000 audit[1307]: CRED_DISP pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:18:41.506582 systemd-logind[1191]: Removed session 6. Dec 13 14:18:41.507184 systemd[1]: Started sshd@6-10.0.0.25:22-10.0.0.1:42758.service. Dec 13 14:18:41.499000 audit[1304]: USER_END pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:41.512702 kernel: audit: type=1106 audit(1734099521.499:196): pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:41.512754 kernel: audit: type=1104 audit(1734099521.499:197): pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:41.499000 audit[1304]: CRED_DISP pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:41.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.25:22-10.0.0.1:42756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:41.520944 kernel: audit: type=1131 audit(1734099521.500:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.25:22-10.0.0.1:42756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:41.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.25:22-10.0.0.1:42758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:41.546000 audit[1334]: USER_ACCT pid=1334 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:41.547940 sshd[1334]: Accepted publickey for core from 10.0.0.1 port 42758 ssh2: RSA SHA256:G6GGwH/f10E2j6mIu1+COWQkyppDOEetpcI3w1A8nX8 Dec 13 14:18:41.547000 audit[1334]: CRED_ACQ pid=1334 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:41.547000 audit[1334]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd71608e20 a2=3 a3=0 items=0 ppid=1 pid=1334 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:41.547000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:18:41.549045 sshd[1334]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:18:41.552641 systemd-logind[1191]: New session 7 of user core. Dec 13 14:18:41.553525 systemd[1]: Started session-7.scope. Dec 13 14:18:41.555000 audit[1334]: USER_START pid=1334 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:41.557000 audit[1336]: CRED_ACQ pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:41.603000 audit[1337]: USER_ACCT pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:18:41.603000 audit[1337]: CRED_REFR pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:18:41.605208 sudo[1337]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:18:41.605460 sudo[1337]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:18:41.605000 audit[1337]: USER_START pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:18:41.616576 systemd[1]: Starting coreos-metadata.service... Dec 13 14:18:41.622359 systemd[1]: coreos-metadata.service: Deactivated successfully. Dec 13 14:18:41.622534 systemd[1]: Finished coreos-metadata.service. Dec 13 14:18:41.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:41.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:42.537536 systemd[1]: Stopped kubelet.service. Dec 13 14:18:42.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:42.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:42.537772 systemd[1]: kubelet.service: Consumed 1.774s CPU time. Dec 13 14:18:42.540387 systemd[1]: Starting kubelet.service... Dec 13 14:18:42.558282 systemd[1]: Reloading. Dec 13 14:18:42.687213 /usr/lib/systemd/system-generators/torcx-generator[1402]: time="2024-12-13T14:18:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:18:42.687246 /usr/lib/systemd/system-generators/torcx-generator[1402]: time="2024-12-13T14:18:42Z" level=info msg="torcx already run" Dec 13 14:18:42.729571 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:18:42.729594 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:18:42.748930 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit: BPF prog-id=40 op=LOAD Dec 13 14:18:42.808000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit: BPF prog-id=41 op=LOAD Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.808000 audit: BPF prog-id=42 op=LOAD Dec 13 14:18:42.808000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:18:42.808000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:18:42.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.809000 audit: BPF prog-id=43 op=LOAD Dec 13 14:18:42.809000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:18:42.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.810000 audit: BPF prog-id=44 op=LOAD Dec 13 14:18:42.810000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:18:42.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.812000 audit: BPF prog-id=45 op=LOAD Dec 13 14:18:42.812000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:18:42.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.813000 audit: BPF prog-id=46 op=LOAD Dec 13 14:18:42.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.813000 audit: BPF prog-id=47 op=LOAD Dec 13 14:18:42.813000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:18:42.813000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.814000 audit: BPF prog-id=48 op=LOAD Dec 13 14:18:42.814000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.814000 audit: BPF prog-id=49 op=LOAD Dec 13 14:18:42.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.815000 audit: BPF prog-id=50 op=LOAD Dec 13 14:18:42.815000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:18:42.815000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:18:42.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit: BPF prog-id=51 op=LOAD Dec 13 14:18:42.816000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit: BPF prog-id=52 op=LOAD Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.816000 audit: BPF prog-id=53 op=LOAD Dec 13 14:18:42.816000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:18:42.816000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:18:42.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:42.817000 audit: BPF prog-id=54 op=LOAD Dec 13 14:18:42.817000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:18:42.828331 systemd[1]: Started kubelet.service. Dec 13 14:18:42.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:42.829619 systemd[1]: Stopping kubelet.service... Dec 13 14:18:42.830438 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:18:42.830623 systemd[1]: Stopped kubelet.service. Dec 13 14:18:42.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:42.831957 systemd[1]: Starting kubelet.service... Dec 13 14:18:42.910230 systemd[1]: Started kubelet.service. Dec 13 14:18:42.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:43.068085 kubelet[1451]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:18:43.068085 kubelet[1451]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:18:43.068085 kubelet[1451]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:18:43.069695 kubelet[1451]: I1213 14:18:43.069632 1451 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:18:43.449292 kubelet[1451]: I1213 14:18:43.449178 1451 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:18:43.449292 kubelet[1451]: I1213 14:18:43.449220 1451 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:18:43.449507 kubelet[1451]: I1213 14:18:43.449482 1451 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:18:43.461135 kubelet[1451]: I1213 14:18:43.461101 1451 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:18:43.476944 kubelet[1451]: I1213 14:18:43.476905 1451 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:18:43.479032 kubelet[1451]: I1213 14:18:43.478974 1451 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:18:43.479354 kubelet[1451]: I1213 14:18:43.479026 1451 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.25","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:18:43.482168 kubelet[1451]: I1213 14:18:43.482142 1451 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:18:43.482223 kubelet[1451]: I1213 14:18:43.482172 1451 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:18:43.482335 kubelet[1451]: I1213 14:18:43.482319 1451 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:18:43.483424 kubelet[1451]: I1213 14:18:43.483384 1451 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:18:43.483534 kubelet[1451]: I1213 14:18:43.483502 1451 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:18:43.483703 kubelet[1451]: I1213 14:18:43.483581 1451 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:18:43.483703 kubelet[1451]: I1213 14:18:43.483613 1451 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:18:43.483703 kubelet[1451]: E1213 14:18:43.483647 1451 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:43.483703 kubelet[1451]: E1213 14:18:43.483693 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:43.488587 kubelet[1451]: I1213 14:18:43.488527 1451 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:18:43.493905 kubelet[1451]: I1213 14:18:43.493881 1451 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:18:43.493966 kubelet[1451]: W1213 14:18:43.493943 1451 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:18:43.494617 kubelet[1451]: I1213 14:18:43.494596 1451 server.go:1264] "Started kubelet" Dec 13 14:18:43.494808 kubelet[1451]: I1213 14:18:43.494764 1451 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:18:43.496307 kubelet[1451]: I1213 14:18:43.496247 1451 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:18:43.496497 kubelet[1451]: I1213 14:18:43.496481 1451 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:18:43.496699 kubelet[1451]: I1213 14:18:43.496676 1451 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:18:43.497000 audit[1451]: AVC avc: denied { mac_admin } for pid=1451 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:43.497000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:18:43.497000 audit[1451]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009fbec0 a1=c000bfc048 a2=c0009fbe90 a3=25 items=0 ppid=1 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:43.497000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:18:43.497000 audit[1451]: AVC avc: denied { mac_admin } for pid=1451 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:43.497000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:18:43.497000 audit[1451]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b35a60 a1=c000bfc5a0 a2=c0009fbf50 a3=25 items=0 ppid=1 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:43.497000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:18:43.499032 kubelet[1451]: I1213 14:18:43.498711 1451 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:18:43.499032 kubelet[1451]: I1213 14:18:43.498765 1451 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:18:43.499032 kubelet[1451]: I1213 14:18:43.498835 1451 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:18:43.502017 kubelet[1451]: E1213 14:18:43.501991 1451 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.25\" not found" Dec 13 14:18:43.502608 kubelet[1451]: I1213 14:18:43.502547 1451 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:18:43.502710 kubelet[1451]: I1213 14:18:43.502667 1451 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:18:43.502886 kubelet[1451]: I1213 14:18:43.502746 1451 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:18:43.503244 kubelet[1451]: I1213 14:18:43.503224 1451 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:18:43.503363 kubelet[1451]: I1213 14:18:43.503330 1451 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:18:43.504936 kubelet[1451]: E1213 14:18:43.504892 1451 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:18:43.505429 kubelet[1451]: I1213 14:18:43.505386 1451 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:18:43.508438 kubelet[1451]: E1213 14:18:43.508395 1451 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.0.0.25\" not found" node="10.0.0.25" Dec 13 14:18:43.569997 kubelet[1451]: I1213 14:18:43.569970 1451 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:18:43.569997 kubelet[1451]: I1213 14:18:43.569985 1451 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:18:43.569997 kubelet[1451]: I1213 14:18:43.570006 1451 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:18:43.603217 kubelet[1451]: I1213 14:18:43.603185 1451 kubelet_node_status.go:73] "Attempting to register node" node="10.0.0.25" Dec 13 14:18:43.999551 kubelet[1451]: I1213 14:18:43.999505 1451 kubelet_node_status.go:76] "Successfully registered node" node="10.0.0.25" Dec 13 14:18:43.999822 kubelet[1451]: I1213 14:18:43.999805 1451 policy_none.go:49] "None policy: Start" Dec 13 14:18:44.000642 kubelet[1451]: I1213 14:18:44.000613 1451 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:18:44.000642 kubelet[1451]: I1213 14:18:44.000644 1451 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:18:44.007494 kubelet[1451]: I1213 14:18:44.007447 1451 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 14:18:44.008371 env[1197]: time="2024-12-13T14:18:44.008214882Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:18:44.009188 kubelet[1451]: I1213 14:18:44.009152 1451 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 14:18:44.009629 sudo[1337]: pam_unix(sudo:session): session closed for user root Dec 13 14:18:44.008000 audit[1337]: USER_END pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:18:44.008000 audit[1337]: CRED_DISP pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:18:44.010874 sshd[1334]: pam_unix(sshd:session): session closed for user core Dec 13 14:18:44.010000 audit[1334]: USER_END pid=1334 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:44.010000 audit[1334]: CRED_DISP pid=1334 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 14:18:44.013691 systemd[1]: sshd@6-10.0.0.25:22-10.0.0.1:42758.service: Deactivated successfully. Dec 13 14:18:44.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.25:22-10.0.0.1:42758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:44.014614 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:18:44.015224 systemd-logind[1191]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:18:44.016296 systemd-logind[1191]: Removed session 7. Dec 13 14:18:44.018369 systemd[1]: Created slice kubepods.slice. Dec 13 14:18:44.022178 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:18:44.023000 audit[1467]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:44.023000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc3035a4c0 a2=0 a3=7ffc3035a4ac items=0 ppid=1451 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:44.023000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:18:44.025000 audit[1472]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:44.025000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc3b5816a0 a2=0 a3=7ffc3b58168c items=0 ppid=1451 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:44.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:18:44.032082 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:18:44.033264 kubelet[1451]: I1213 14:18:44.033234 1451 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:18:44.031000 audit[1451]: AVC avc: denied { mac_admin } for pid=1451 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:44.031000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:18:44.031000 audit[1451]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bb9da0 a1=c0010444e0 a2=c000bb9d70 a3=25 items=0 ppid=1 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:44.031000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:18:44.033522 kubelet[1451]: I1213 14:18:44.033300 1451 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:18:44.033522 kubelet[1451]: I1213 14:18:44.033432 1451 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:18:44.033832 kubelet[1451]: I1213 14:18:44.033800 1451 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:18:44.027000 audit[1474]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:44.027000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd3015cac0 a2=0 a3=7ffd3015caac items=0 ppid=1451 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:44.027000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:18:44.049000 audit[1479]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:44.049000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc0a97e500 a2=0 a3=7ffc0a97e4ec items=0 ppid=1451 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:44.049000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:18:44.090000 audit[1484]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:44.090000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffce9acb840 a2=0 a3=7ffce9acb82c items=0 ppid=1451 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:44.090000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:18:44.092907 kubelet[1451]: I1213 14:18:44.092842 1451 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:18:44.092000 audit[1485]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:44.092000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc27a7f9e0 a2=0 a3=7ffc27a7f9cc items=0 ppid=1451 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:44.092000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:18:44.093985 kubelet[1451]: I1213 14:18:44.093957 1451 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:18:44.092000 audit[1486]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:44.092000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc05c208a0 a2=0 a3=7ffc05c2088c items=0 ppid=1451 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:44.092000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:18:44.094177 kubelet[1451]: I1213 14:18:44.094009 1451 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:18:44.094177 kubelet[1451]: I1213 14:18:44.094067 1451 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:18:44.094277 kubelet[1451]: E1213 14:18:44.094121 1451 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:18:44.093000 audit[1487]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:44.093000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc982a780 a2=0 a3=7ffdc982a76c items=0 ppid=1451 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:44.093000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:18:44.093000 audit[1488]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:44.093000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdd82ae050 a2=0 a3=7ffdd82ae03c items=0 ppid=1451 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:44.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:18:44.094000 audit[1489]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:44.094000 audit[1489]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffa58bded0 a2=0 a3=7fffa58bdebc items=0 ppid=1451 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:44.094000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:18:44.095000 audit[1490]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:44.095000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9a8d7150 a2=0 a3=7ffd9a8d713c items=0 ppid=1451 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:44.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:18:44.097000 audit[1491]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:44.097000 audit[1491]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe24ef6840 a2=0 a3=7ffe24ef682c items=0 ppid=1451 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:44.097000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:18:44.451942 kubelet[1451]: I1213 14:18:44.451796 1451 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 14:18:44.452110 kubelet[1451]: W1213 14:18:44.452062 1451 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:18:44.452110 kubelet[1451]: W1213 14:18:44.452107 1451 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:18:44.452370 kubelet[1451]: W1213 14:18:44.452138 1451 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 14:18:44.483896 kubelet[1451]: I1213 14:18:44.483841 1451 apiserver.go:52] "Watching apiserver" Dec 13 14:18:44.483896 kubelet[1451]: E1213 14:18:44.483886 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:44.487793 kubelet[1451]: I1213 14:18:44.487743 1451 topology_manager.go:215] "Topology Admit Handler" podUID="6e873ef1-ed06-4b95-8eb4-38972c0fd62b" podNamespace="calico-system" podName="calico-node-h9kkt" Dec 13 14:18:44.487946 kubelet[1451]: I1213 14:18:44.487919 1451 topology_manager.go:215] "Topology Admit Handler" podUID="cfc8d7f2-8854-4340-849a-9ba30c93a44e" podNamespace="calico-system" podName="csi-node-driver-bzpg8" Dec 13 14:18:44.488039 kubelet[1451]: I1213 14:18:44.488021 1451 topology_manager.go:215] "Topology Admit Handler" podUID="b1d5e625-5ff5-4b27-8ab4-f53466e8eb69" podNamespace="kube-system" podName="kube-proxy-j8jw5" Dec 13 14:18:44.488328 kubelet[1451]: E1213 14:18:44.488296 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bzpg8" podUID="cfc8d7f2-8854-4340-849a-9ba30c93a44e" Dec 13 14:18:44.493622 systemd[1]: Created slice kubepods-besteffort-pod6e873ef1_ed06_4b95_8eb4_38972c0fd62b.slice. Dec 13 14:18:44.501126 systemd[1]: Created slice kubepods-besteffort-podb1d5e625_5ff5_4b27_8ab4_f53466e8eb69.slice. Dec 13 14:18:44.509866 kubelet[1451]: I1213 14:18:44.509820 1451 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:18:44.609144 kubelet[1451]: I1213 14:18:44.609060 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6e873ef1-ed06-4b95-8eb4-38972c0fd62b-node-certs\") pod \"calico-node-h9kkt\" (UID: \"6e873ef1-ed06-4b95-8eb4-38972c0fd62b\") " pod="calico-system/calico-node-h9kkt" Dec 13 14:18:44.609144 kubelet[1451]: I1213 14:18:44.609131 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6e873ef1-ed06-4b95-8eb4-38972c0fd62b-cni-log-dir\") pod \"calico-node-h9kkt\" (UID: \"6e873ef1-ed06-4b95-8eb4-38972c0fd62b\") " pod="calico-system/calico-node-h9kkt" Dec 13 14:18:44.609144 kubelet[1451]: I1213 14:18:44.609164 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6e873ef1-ed06-4b95-8eb4-38972c0fd62b-flexvol-driver-host\") pod \"calico-node-h9kkt\" (UID: \"6e873ef1-ed06-4b95-8eb4-38972c0fd62b\") " pod="calico-system/calico-node-h9kkt" Dec 13 14:18:44.609519 kubelet[1451]: I1213 14:18:44.609187 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/cfc8d7f2-8854-4340-849a-9ba30c93a44e-socket-dir\") pod \"csi-node-driver-bzpg8\" (UID: \"cfc8d7f2-8854-4340-849a-9ba30c93a44e\") " pod="calico-system/csi-node-driver-bzpg8" Dec 13 14:18:44.609519 kubelet[1451]: I1213 14:18:44.609208 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6w7lv\" (UniqueName: \"kubernetes.io/projected/b1d5e625-5ff5-4b27-8ab4-f53466e8eb69-kube-api-access-6w7lv\") pod \"kube-proxy-j8jw5\" (UID: \"b1d5e625-5ff5-4b27-8ab4-f53466e8eb69\") " pod="kube-system/kube-proxy-j8jw5" Dec 13 14:18:44.609519 kubelet[1451]: I1213 14:18:44.609227 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/b1d5e625-5ff5-4b27-8ab4-f53466e8eb69-kube-proxy\") pod \"kube-proxy-j8jw5\" (UID: \"b1d5e625-5ff5-4b27-8ab4-f53466e8eb69\") " pod="kube-system/kube-proxy-j8jw5" Dec 13 14:18:44.609519 kubelet[1451]: I1213 14:18:44.609248 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b1d5e625-5ff5-4b27-8ab4-f53466e8eb69-lib-modules\") pod \"kube-proxy-j8jw5\" (UID: \"b1d5e625-5ff5-4b27-8ab4-f53466e8eb69\") " pod="kube-system/kube-proxy-j8jw5" Dec 13 14:18:44.609519 kubelet[1451]: I1213 14:18:44.609275 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6e873ef1-ed06-4b95-8eb4-38972c0fd62b-lib-modules\") pod \"calico-node-h9kkt\" (UID: \"6e873ef1-ed06-4b95-8eb4-38972c0fd62b\") " pod="calico-system/calico-node-h9kkt" Dec 13 14:18:44.609705 kubelet[1451]: I1213 14:18:44.609309 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6e873ef1-ed06-4b95-8eb4-38972c0fd62b-xtables-lock\") pod \"calico-node-h9kkt\" (UID: \"6e873ef1-ed06-4b95-8eb4-38972c0fd62b\") " pod="calico-system/calico-node-h9kkt" Dec 13 14:18:44.609705 kubelet[1451]: I1213 14:18:44.609373 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6e873ef1-ed06-4b95-8eb4-38972c0fd62b-policysync\") pod \"calico-node-h9kkt\" (UID: \"6e873ef1-ed06-4b95-8eb4-38972c0fd62b\") " pod="calico-system/calico-node-h9kkt" Dec 13 14:18:44.609705 kubelet[1451]: I1213 14:18:44.609439 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6e873ef1-ed06-4b95-8eb4-38972c0fd62b-tigera-ca-bundle\") pod \"calico-node-h9kkt\" (UID: \"6e873ef1-ed06-4b95-8eb4-38972c0fd62b\") " pod="calico-system/calico-node-h9kkt" Dec 13 14:18:44.609705 kubelet[1451]: I1213 14:18:44.609507 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/cfc8d7f2-8854-4340-849a-9ba30c93a44e-varrun\") pod \"csi-node-driver-bzpg8\" (UID: \"cfc8d7f2-8854-4340-849a-9ba30c93a44e\") " pod="calico-system/csi-node-driver-bzpg8" Dec 13 14:18:44.609705 kubelet[1451]: I1213 14:18:44.609541 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6e873ef1-ed06-4b95-8eb4-38972c0fd62b-var-run-calico\") pod \"calico-node-h9kkt\" (UID: \"6e873ef1-ed06-4b95-8eb4-38972c0fd62b\") " pod="calico-system/calico-node-h9kkt" Dec 13 14:18:44.609874 kubelet[1451]: I1213 14:18:44.609577 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6e873ef1-ed06-4b95-8eb4-38972c0fd62b-cni-bin-dir\") pod \"calico-node-h9kkt\" (UID: \"6e873ef1-ed06-4b95-8eb4-38972c0fd62b\") " pod="calico-system/calico-node-h9kkt" Dec 13 14:18:44.609874 kubelet[1451]: I1213 14:18:44.609597 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xscxf\" (UniqueName: \"kubernetes.io/projected/6e873ef1-ed06-4b95-8eb4-38972c0fd62b-kube-api-access-xscxf\") pod \"calico-node-h9kkt\" (UID: \"6e873ef1-ed06-4b95-8eb4-38972c0fd62b\") " pod="calico-system/calico-node-h9kkt" Dec 13 14:18:44.609874 kubelet[1451]: I1213 14:18:44.609625 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/cfc8d7f2-8854-4340-849a-9ba30c93a44e-registration-dir\") pod \"csi-node-driver-bzpg8\" (UID: \"cfc8d7f2-8854-4340-849a-9ba30c93a44e\") " pod="calico-system/csi-node-driver-bzpg8" Dec 13 14:18:44.609874 kubelet[1451]: I1213 14:18:44.609643 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6e873ef1-ed06-4b95-8eb4-38972c0fd62b-var-lib-calico\") pod \"calico-node-h9kkt\" (UID: \"6e873ef1-ed06-4b95-8eb4-38972c0fd62b\") " pod="calico-system/calico-node-h9kkt" Dec 13 14:18:44.609874 kubelet[1451]: I1213 14:18:44.609659 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6e873ef1-ed06-4b95-8eb4-38972c0fd62b-cni-net-dir\") pod \"calico-node-h9kkt\" (UID: \"6e873ef1-ed06-4b95-8eb4-38972c0fd62b\") " pod="calico-system/calico-node-h9kkt" Dec 13 14:18:44.610061 kubelet[1451]: I1213 14:18:44.609698 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/cfc8d7f2-8854-4340-849a-9ba30c93a44e-kubelet-dir\") pod \"csi-node-driver-bzpg8\" (UID: \"cfc8d7f2-8854-4340-849a-9ba30c93a44e\") " pod="calico-system/csi-node-driver-bzpg8" Dec 13 14:18:44.610061 kubelet[1451]: I1213 14:18:44.609714 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dqnll\" (UniqueName: \"kubernetes.io/projected/cfc8d7f2-8854-4340-849a-9ba30c93a44e-kube-api-access-dqnll\") pod \"csi-node-driver-bzpg8\" (UID: \"cfc8d7f2-8854-4340-849a-9ba30c93a44e\") " pod="calico-system/csi-node-driver-bzpg8" Dec 13 14:18:44.610061 kubelet[1451]: I1213 14:18:44.609740 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b1d5e625-5ff5-4b27-8ab4-f53466e8eb69-xtables-lock\") pod \"kube-proxy-j8jw5\" (UID: \"b1d5e625-5ff5-4b27-8ab4-f53466e8eb69\") " pod="kube-system/kube-proxy-j8jw5" Dec 13 14:18:44.711932 kubelet[1451]: E1213 14:18:44.711838 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:44.711932 kubelet[1451]: W1213 14:18:44.711865 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:44.711932 kubelet[1451]: E1213 14:18:44.711888 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:44.714653 kubelet[1451]: E1213 14:18:44.714588 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:44.714653 kubelet[1451]: W1213 14:18:44.714636 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:44.714863 kubelet[1451]: E1213 14:18:44.714680 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:44.778445 kubelet[1451]: E1213 14:18:44.777603 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:44.778445 kubelet[1451]: W1213 14:18:44.777626 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:44.778445 kubelet[1451]: E1213 14:18:44.777655 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:44.778445 kubelet[1451]: E1213 14:18:44.777868 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:44.778445 kubelet[1451]: W1213 14:18:44.777874 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:44.778445 kubelet[1451]: E1213 14:18:44.777881 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:44.782446 kubelet[1451]: E1213 14:18:44.782334 1451 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:18:44.782446 kubelet[1451]: W1213 14:18:44.782353 1451 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:18:44.782446 kubelet[1451]: E1213 14:18:44.782374 1451 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:18:44.799651 kubelet[1451]: E1213 14:18:44.799623 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:44.800538 env[1197]: time="2024-12-13T14:18:44.800502424Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-h9kkt,Uid:6e873ef1-ed06-4b95-8eb4-38972c0fd62b,Namespace:calico-system,Attempt:0,}" Dec 13 14:18:44.803785 kubelet[1451]: E1213 14:18:44.803695 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:44.804284 env[1197]: time="2024-12-13T14:18:44.804242317Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-j8jw5,Uid:b1d5e625-5ff5-4b27-8ab4-f53466e8eb69,Namespace:kube-system,Attempt:0,}" Dec 13 14:18:45.484811 kubelet[1451]: E1213 14:18:45.484762 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:45.851653 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1592672521.mount: Deactivated successfully. Dec 13 14:18:45.865488 env[1197]: time="2024-12-13T14:18:45.865387924Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:45.866630 env[1197]: time="2024-12-13T14:18:45.866500250Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:45.870956 env[1197]: time="2024-12-13T14:18:45.870913777Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:45.872354 env[1197]: time="2024-12-13T14:18:45.872311508Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:45.873642 env[1197]: time="2024-12-13T14:18:45.873604433Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:45.875193 env[1197]: time="2024-12-13T14:18:45.875158778Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:45.876674 env[1197]: time="2024-12-13T14:18:45.876639815Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:45.878443 env[1197]: time="2024-12-13T14:18:45.878410506Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:45.915816 env[1197]: time="2024-12-13T14:18:45.913452773Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:18:45.915816 env[1197]: time="2024-12-13T14:18:45.913503648Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:18:45.915816 env[1197]: time="2024-12-13T14:18:45.913513417Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:18:45.915816 env[1197]: time="2024-12-13T14:18:45.913755551Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9e8960656bca9d0d289716929258438e7cc2bdf77393506ce459c63a8647d05e pid=1520 runtime=io.containerd.runc.v2 Dec 13 14:18:45.919754 env[1197]: time="2024-12-13T14:18:45.919685832Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:18:45.919754 env[1197]: time="2024-12-13T14:18:45.919720918Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:18:45.919754 env[1197]: time="2024-12-13T14:18:45.919734674Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:18:45.920066 env[1197]: time="2024-12-13T14:18:45.920034175Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3d6ba98be64d196858f798a91d2d550cea876c2acb5186514793af5a0cc37b12 pid=1516 runtime=io.containerd.runc.v2 Dec 13 14:18:45.983109 systemd[1]: Started cri-containerd-9e8960656bca9d0d289716929258438e7cc2bdf77393506ce459c63a8647d05e.scope. Dec 13 14:18:45.995379 systemd[1]: Started cri-containerd-3d6ba98be64d196858f798a91d2d550cea876c2acb5186514793af5a0cc37b12.scope. Dec 13 14:18:46.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.052000 audit: BPF prog-id=55 op=LOAD Dec 13 14:18:46.052000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.052000 audit[1537]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1520 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:46.052000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965383936303635366263613964306432383937313639323932353834 Dec 13 14:18:46.053000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.053000 audit[1537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1520 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:46.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965383936303635366263613964306432383937313639323932353834 Dec 13 14:18:46.053000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.053000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.053000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.053000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.053000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.053000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.053000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.053000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.053000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.053000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.053000 audit: BPF prog-id=56 op=LOAD Dec 13 14:18:46.053000 audit[1537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000308520 items=0 ppid=1520 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:46.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965383936303635366263613964306432383937313639323932353834 Dec 13 14:18:46.054000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.054000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.054000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.054000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.054000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.054000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.054000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.054000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.054000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.054000 audit: BPF prog-id=57 op=LOAD Dec 13 14:18:46.054000 audit[1537]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000308568 items=0 ppid=1520 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:46.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965383936303635366263613964306432383937313639323932353834 Dec 13 14:18:46.054000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:18:46.054000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:18:46.054000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.054000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.054000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.054000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.054000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.054000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.054000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.054000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.054000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.054000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.054000 audit: BPF prog-id=58 op=LOAD Dec 13 14:18:46.054000 audit[1537]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000308978 items=0 ppid=1520 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:46.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965383936303635366263613964306432383937313639323932353834 Dec 13 14:18:46.076820 env[1197]: time="2024-12-13T14:18:46.076764400Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-h9kkt,Uid:6e873ef1-ed06-4b95-8eb4-38972c0fd62b,Namespace:calico-system,Attempt:0,} returns sandbox id \"9e8960656bca9d0d289716929258438e7cc2bdf77393506ce459c63a8647d05e\"" Dec 13 14:18:46.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit: BPF prog-id=59 op=LOAD Dec 13 14:18:46.078664 kubelet[1451]: E1213 14:18:46.077907 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1516 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:46.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364366261393862653634643139363835386637393861393164326435 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1516 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:46.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364366261393862653634643139363835386637393861393164326435 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit: BPF prog-id=60 op=LOAD Dec 13 14:18:46.077000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000378880 items=0 ppid=1516 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:46.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364366261393862653634643139363835386637393861393164326435 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.077000 audit: BPF prog-id=61 op=LOAD Dec 13 14:18:46.077000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003788c8 items=0 ppid=1516 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:46.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364366261393862653634643139363835386637393861393164326435 Dec 13 14:18:46.077000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:18:46.077000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:18:46.078000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.078000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.078000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.078000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.078000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.078000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.078000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.078000 audit[1541]: AVC avc: denied { perfmon } for pid=1541 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.078000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.078000 audit[1541]: AVC avc: denied { bpf } for pid=1541 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:46.078000 audit: BPF prog-id=62 op=LOAD Dec 13 14:18:46.078000 audit[1541]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000378cd8 items=0 ppid=1516 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:46.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364366261393862653634643139363835386637393861393164326435 Dec 13 14:18:46.082041 env[1197]: time="2024-12-13T14:18:46.082005469Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:18:46.089907 env[1197]: time="2024-12-13T14:18:46.089868876Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-j8jw5,Uid:b1d5e625-5ff5-4b27-8ab4-f53466e8eb69,Namespace:kube-system,Attempt:0,} returns sandbox id \"3d6ba98be64d196858f798a91d2d550cea876c2acb5186514793af5a0cc37b12\"" Dec 13 14:18:46.090701 kubelet[1451]: E1213 14:18:46.090657 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:46.094612 kubelet[1451]: E1213 14:18:46.094579 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bzpg8" podUID="cfc8d7f2-8854-4340-849a-9ba30c93a44e" Dec 13 14:18:46.485691 kubelet[1451]: E1213 14:18:46.485636 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:47.486215 kubelet[1451]: E1213 14:18:47.486161 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:47.966892 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4229431939.mount: Deactivated successfully. Dec 13 14:18:48.094949 kubelet[1451]: E1213 14:18:48.094780 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bzpg8" podUID="cfc8d7f2-8854-4340-849a-9ba30c93a44e" Dec 13 14:18:48.115380 env[1197]: time="2024-12-13T14:18:48.115311183Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:48.119627 env[1197]: time="2024-12-13T14:18:48.119592252Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:48.121456 env[1197]: time="2024-12-13T14:18:48.121395934Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:48.122968 env[1197]: time="2024-12-13T14:18:48.122923209Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:48.123413 env[1197]: time="2024-12-13T14:18:48.123350410Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:18:48.124801 env[1197]: time="2024-12-13T14:18:48.124763029Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 14:18:48.126202 env[1197]: time="2024-12-13T14:18:48.126177912Z" level=info msg="CreateContainer within sandbox \"9e8960656bca9d0d289716929258438e7cc2bdf77393506ce459c63a8647d05e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:18:48.147680 env[1197]: time="2024-12-13T14:18:48.147597572Z" level=info msg="CreateContainer within sandbox \"9e8960656bca9d0d289716929258438e7cc2bdf77393506ce459c63a8647d05e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"7eea5b4795911ce79b8e115fd4ab66a5f3164b29fec366e11a0a10081eea88eb\"" Dec 13 14:18:48.148597 env[1197]: time="2024-12-13T14:18:48.148551551Z" level=info msg="StartContainer for \"7eea5b4795911ce79b8e115fd4ab66a5f3164b29fec366e11a0a10081eea88eb\"" Dec 13 14:18:48.170158 systemd[1]: Started cri-containerd-7eea5b4795911ce79b8e115fd4ab66a5f3164b29fec366e11a0a10081eea88eb.scope. Dec 13 14:18:48.197000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.199552 kernel: kauditd_printk_skb: 357 callbacks suppressed Dec 13 14:18:48.199615 kernel: audit: type=1400 audit(1734099528.197:443): avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.197000 audit[1594]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f52d74d46a8 items=0 ppid=1520 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:48.207529 kernel: audit: type=1300 audit(1734099528.197:443): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f52d74d46a8 items=0 ppid=1520 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:48.207595 kernel: audit: type=1327 audit(1734099528.197:443): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765656135623437393539313163653739623865313135666434616236 Dec 13 14:18:48.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765656135623437393539313163653739623865313135666434616236 Dec 13 14:18:48.211776 kernel: audit: type=1400 audit(1734099528.198:444): avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.198000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.214885 kernel: audit: type=1400 audit(1734099528.198:444): avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.198000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.198000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.221607 kernel: audit: type=1400 audit(1734099528.198:444): avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.221724 kernel: audit: type=1400 audit(1734099528.198:444): avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.198000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.198000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.227837 kernel: audit: type=1400 audit(1734099528.198:444): avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.227882 kernel: audit: type=1400 audit(1734099528.198:444): avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.198000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.198000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.234518 kernel: audit: type=1400 audit(1734099528.198:444): avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.198000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.198000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.198000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.198000 audit: BPF prog-id=63 op=LOAD Dec 13 14:18:48.198000 audit[1594]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002f3c58 items=0 ppid=1520 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:48.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765656135623437393539313163653739623865313135666434616236 Dec 13 14:18:48.210000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.210000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.210000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.210000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.210000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.210000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.210000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.210000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.210000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.210000 audit: BPF prog-id=64 op=LOAD Dec 13 14:18:48.210000 audit[1594]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002f3ca8 items=0 ppid=1520 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:48.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765656135623437393539313163653739623865313135666434616236 Dec 13 14:18:48.216000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:18:48.216000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:18:48.216000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.216000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.216000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.216000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.216000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.216000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.216000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.216000 audit[1594]: AVC avc: denied { perfmon } for pid=1594 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.216000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.216000 audit[1594]: AVC avc: denied { bpf } for pid=1594 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:48.216000 audit: BPF prog-id=65 op=LOAD Dec 13 14:18:48.216000 audit[1594]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002f3d38 items=0 ppid=1520 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:48.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765656135623437393539313163653739623865313135666434616236 Dec 13 14:18:48.254821 env[1197]: time="2024-12-13T14:18:48.254745052Z" level=info msg="StartContainer for \"7eea5b4795911ce79b8e115fd4ab66a5f3164b29fec366e11a0a10081eea88eb\" returns successfully" Dec 13 14:18:48.267497 systemd[1]: cri-containerd-7eea5b4795911ce79b8e115fd4ab66a5f3164b29fec366e11a0a10081eea88eb.scope: Deactivated successfully. Dec 13 14:18:48.271000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:18:48.343358 env[1197]: time="2024-12-13T14:18:48.343306646Z" level=info msg="shim disconnected" id=7eea5b4795911ce79b8e115fd4ab66a5f3164b29fec366e11a0a10081eea88eb Dec 13 14:18:48.343358 env[1197]: time="2024-12-13T14:18:48.343351059Z" level=warning msg="cleaning up after shim disconnected" id=7eea5b4795911ce79b8e115fd4ab66a5f3164b29fec366e11a0a10081eea88eb namespace=k8s.io Dec 13 14:18:48.343358 env[1197]: time="2024-12-13T14:18:48.343359014Z" level=info msg="cleaning up dead shim" Dec 13 14:18:48.405009 env[1197]: time="2024-12-13T14:18:48.404958686Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:18:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1633 runtime=io.containerd.runc.v2\n" Dec 13 14:18:48.486635 kubelet[1451]: E1213 14:18:48.486470 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:48.920996 systemd[1]: run-containerd-runc-k8s.io-7eea5b4795911ce79b8e115fd4ab66a5f3164b29fec366e11a0a10081eea88eb-runc.h07omq.mount: Deactivated successfully. Dec 13 14:18:48.921110 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7eea5b4795911ce79b8e115fd4ab66a5f3164b29fec366e11a0a10081eea88eb-rootfs.mount: Deactivated successfully. Dec 13 14:18:49.106032 kubelet[1451]: E1213 14:18:49.105999 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:49.487494 kubelet[1451]: E1213 14:18:49.487425 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:50.094538 kubelet[1451]: E1213 14:18:50.094473 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bzpg8" podUID="cfc8d7f2-8854-4340-849a-9ba30c93a44e" Dec 13 14:18:50.488286 kubelet[1451]: E1213 14:18:50.487986 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:51.161101 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2089782296.mount: Deactivated successfully. Dec 13 14:18:51.488474 kubelet[1451]: E1213 14:18:51.488333 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:52.094980 kubelet[1451]: E1213 14:18:52.094600 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bzpg8" podUID="cfc8d7f2-8854-4340-849a-9ba30c93a44e" Dec 13 14:18:52.242668 env[1197]: time="2024-12-13T14:18:52.242601476Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:52.245614 env[1197]: time="2024-12-13T14:18:52.245557499Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:52.247752 env[1197]: time="2024-12-13T14:18:52.247694788Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:52.249082 env[1197]: time="2024-12-13T14:18:52.249054377Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:52.249525 env[1197]: time="2024-12-13T14:18:52.249476379Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 14:18:52.250813 env[1197]: time="2024-12-13T14:18:52.250770977Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:18:52.251833 env[1197]: time="2024-12-13T14:18:52.251784758Z" level=info msg="CreateContainer within sandbox \"3d6ba98be64d196858f798a91d2d550cea876c2acb5186514793af5a0cc37b12\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:18:52.265753 env[1197]: time="2024-12-13T14:18:52.265699663Z" level=info msg="CreateContainer within sandbox \"3d6ba98be64d196858f798a91d2d550cea876c2acb5186514793af5a0cc37b12\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c53da810b79de72119696b82410b892c0365ee2809745f8b3c63dc11f09c673a\"" Dec 13 14:18:52.266243 env[1197]: time="2024-12-13T14:18:52.266202406Z" level=info msg="StartContainer for \"c53da810b79de72119696b82410b892c0365ee2809745f8b3c63dc11f09c673a\"" Dec 13 14:18:52.316328 systemd[1]: Started cri-containerd-c53da810b79de72119696b82410b892c0365ee2809745f8b3c63dc11f09c673a.scope. Dec 13 14:18:52.340000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.340000 audit[1657]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fae82245688 items=0 ppid=1516 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335336461383130623739646537323131393639366238323431306238 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit: BPF prog-id=66 op=LOAD Dec 13 14:18:52.341000 audit[1657]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00029dfb8 items=0 ppid=1516 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335336461383130623739646537323131393639366238323431306238 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit: BPF prog-id=67 op=LOAD Dec 13 14:18:52.341000 audit[1657]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00040a008 items=0 ppid=1516 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335336461383130623739646537323131393639366238323431306238 Dec 13 14:18:52.341000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:18:52.341000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { perfmon } for pid=1657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit[1657]: AVC avc: denied { bpf } for pid=1657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:52.341000 audit: BPF prog-id=68 op=LOAD Dec 13 14:18:52.341000 audit[1657]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00040a098 items=0 ppid=1516 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335336461383130623739646537323131393639366238323431306238 Dec 13 14:18:52.409271 env[1197]: time="2024-12-13T14:18:52.408273791Z" level=info msg="StartContainer for \"c53da810b79de72119696b82410b892c0365ee2809745f8b3c63dc11f09c673a\" returns successfully" Dec 13 14:18:52.488921 kubelet[1451]: E1213 14:18:52.488850 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:52.490000 audit[1709]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.490000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffec44b220 a2=0 a3=7fffec44b20c items=0 ppid=1667 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.490000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:18:52.491000 audit[1710]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.491000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff209942d0 a2=0 a3=7fff209942bc items=0 ppid=1667 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.491000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:18:52.492000 audit[1712]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.492000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca93ea660 a2=0 a3=7ffca93ea64c items=0 ppid=1667 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.492000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:18:52.492000 audit[1711]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.492000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff86c6ad50 a2=0 a3=7fff86c6ad3c items=0 ppid=1667 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.492000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:18:52.493000 audit[1713]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.493000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcfd04bb90 a2=0 a3=7ffcfd04bb7c items=0 ppid=1667 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.493000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:18:52.493000 audit[1714]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.493000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffedd5fff00 a2=0 a3=7ffedd5ffeec items=0 ppid=1667 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.493000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:18:52.593000 audit[1715]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.593000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe04e79aa0 a2=0 a3=7ffe04e79a8c items=0 ppid=1667 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:18:52.596000 audit[1717]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.596000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffeb0582980 a2=0 a3=7ffeb058296c items=0 ppid=1667 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:18:52.603000 audit[1720]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.603000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff7217f2e0 a2=0 a3=7fff7217f2cc items=0 ppid=1667 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.603000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:18:52.604000 audit[1721]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.604000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0a9aeaf0 a2=0 a3=7ffd0a9aeadc items=0 ppid=1667 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:18:52.607000 audit[1723]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.607000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe9f51c3b0 a2=0 a3=7ffe9f51c39c items=0 ppid=1667 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.607000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:18:52.608000 audit[1724]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.608000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeeb128c20 a2=0 a3=7ffeeb128c0c items=0 ppid=1667 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.608000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:18:52.610000 audit[1726]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.610000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd45a280e0 a2=0 a3=7ffd45a280cc items=0 ppid=1667 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.610000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:18:52.613000 audit[1729]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.613000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcc2dad2f0 a2=0 a3=7ffcc2dad2dc items=0 ppid=1667 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.613000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:18:52.615000 audit[1730]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.615000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc90c20e90 a2=0 a3=7ffc90c20e7c items=0 ppid=1667 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.615000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:18:52.617000 audit[1732]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.617000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc457a5500 a2=0 a3=7ffc457a54ec items=0 ppid=1667 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.617000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:18:52.618000 audit[1733]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.618000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9b37ceb0 a2=0 a3=7ffe9b37ce9c items=0 ppid=1667 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.618000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:18:52.620000 audit[1735]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.620000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd4542e720 a2=0 a3=7ffd4542e70c items=0 ppid=1667 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.620000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:18:52.623000 audit[1738]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.623000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff44d7b480 a2=0 a3=7fff44d7b46c items=0 ppid=1667 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.623000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:18:52.626000 audit[1741]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.626000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb959c620 a2=0 a3=7ffeb959c60c items=0 ppid=1667 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.626000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:18:52.626000 audit[1742]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.626000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffca46f5650 a2=0 a3=7ffca46f563c items=0 ppid=1667 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.626000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:18:52.628000 audit[1744]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.628000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd685d8c20 a2=0 a3=7ffd685d8c0c items=0 ppid=1667 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.628000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:18:52.652000 audit[1749]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.652000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd29ee7900 a2=0 a3=7ffd29ee78ec items=0 ppid=1667 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.652000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:18:52.654000 audit[1750]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.654000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7bcf70b0 a2=0 a3=7ffd7bcf709c items=0 ppid=1667 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.654000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:18:52.656000 audit[1752]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:18:52.656000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcc608ece0 a2=0 a3=7ffcc608eccc items=0 ppid=1667 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.656000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:18:52.677000 audit[1758]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:52.677000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffec0490070 a2=0 a3=7ffec049005c items=0 ppid=1667 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.677000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:52.696000 audit[1758]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:18:52.696000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=9084 a0=3 a1=7ffec0490070 a2=0 a3=7ffec049005c items=0 ppid=1667 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.696000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:52.697000 audit[1764]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.697000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe01c02620 a2=0 a3=7ffe01c0260c items=0 ppid=1667 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.697000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:18:52.700000 audit[1766]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.700000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc71765330 a2=0 a3=7ffc7176531c items=0 ppid=1667 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.700000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:18:52.703000 audit[1769]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.703000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd84a569e0 a2=0 a3=7ffd84a569cc items=0 ppid=1667 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.703000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:18:52.705000 audit[1770]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.705000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2113b710 a2=0 a3=7ffc2113b6fc items=0 ppid=1667 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.705000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:18:52.707000 audit[1772]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.707000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffda7a74850 a2=0 a3=7ffda7a7483c items=0 ppid=1667 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.707000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:18:52.708000 audit[1773]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.708000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff57e47f0 a2=0 a3=7ffff57e47dc items=0 ppid=1667 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.708000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:18:52.710000 audit[1775]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.710000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe4d687a30 a2=0 a3=7ffe4d687a1c items=0 ppid=1667 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.710000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:18:52.713000 audit[1778]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.713000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff16806940 a2=0 a3=7fff1680692c items=0 ppid=1667 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.713000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:18:52.715000 audit[1779]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.715000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccf98e1c0 a2=0 a3=7ffccf98e1ac items=0 ppid=1667 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.715000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:18:52.718000 audit[1781]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.718000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffce51d6670 a2=0 a3=7ffce51d665c items=0 ppid=1667 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.718000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:18:52.719000 audit[1782]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.719000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc36edfe50 a2=0 a3=7ffc36edfe3c items=0 ppid=1667 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.719000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:18:52.721000 audit[1784]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.721000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd22317a50 a2=0 a3=7ffd22317a3c items=0 ppid=1667 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.721000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:18:52.725000 audit[1787]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.725000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc07aa2770 a2=0 a3=7ffc07aa275c items=0 ppid=1667 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.725000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:18:52.729000 audit[1790]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.729000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcdda6cb40 a2=0 a3=7ffcdda6cb2c items=0 ppid=1667 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.729000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:18:52.730000 audit[1791]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.730000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdf58eeb60 a2=0 a3=7ffdf58eeb4c items=0 ppid=1667 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.730000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:18:52.732000 audit[1793]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.732000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe080bfe50 a2=0 a3=7ffe080bfe3c items=0 ppid=1667 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.732000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:18:52.735000 audit[1796]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.735000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe98265fe0 a2=0 a3=7ffe98265fcc items=0 ppid=1667 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.735000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:18:52.736000 audit[1797]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.736000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdbfd8cf0 a2=0 a3=7ffcdbfd8cdc items=0 ppid=1667 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.736000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:18:52.738000 audit[1799]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.738000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff08d24e00 a2=0 a3=7fff08d24dec items=0 ppid=1667 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.738000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:18:52.739000 audit[1800]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.739000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6e6f4b20 a2=0 a3=7ffe6e6f4b0c items=0 ppid=1667 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.739000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:18:52.741000 audit[1802]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.741000 audit[1802]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdbe870600 a2=0 a3=7ffdbe8705ec items=0 ppid=1667 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.741000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:18:52.744000 audit[1805]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:18:52.744000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe853d54c0 a2=0 a3=7ffe853d54ac items=0 ppid=1667 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.744000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:18:52.747000 audit[1807]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:18:52.747000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffcc20a4320 a2=0 a3=7ffcc20a430c items=0 ppid=1667 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.747000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:52.748000 audit[1807]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:18:52.748000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffcc20a4320 a2=0 a3=7ffcc20a430c items=0 ppid=1667 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:52.748000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:18:53.116013 kubelet[1451]: E1213 14:18:53.115886 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:53.125627 kubelet[1451]: I1213 14:18:53.125531 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-j8jw5" podStartSLOduration=3.9661842910000003 podStartE2EDuration="10.12550751s" podCreationTimestamp="2024-12-13 14:18:43 +0000 UTC" firstStartedPulling="2024-12-13 14:18:46.09118792 +0000 UTC m=+3.177151805" lastFinishedPulling="2024-12-13 14:18:52.250511139 +0000 UTC m=+9.336475024" observedRunningTime="2024-12-13 14:18:53.125158075 +0000 UTC m=+10.211121980" watchObservedRunningTime="2024-12-13 14:18:53.12550751 +0000 UTC m=+10.211471395" Dec 13 14:18:53.489780 kubelet[1451]: E1213 14:18:53.489635 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:54.095435 kubelet[1451]: E1213 14:18:54.095340 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bzpg8" podUID="cfc8d7f2-8854-4340-849a-9ba30c93a44e" Dec 13 14:18:54.117964 kubelet[1451]: E1213 14:18:54.117911 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:18:54.490353 kubelet[1451]: E1213 14:18:54.490107 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:55.491090 kubelet[1451]: E1213 14:18:55.490988 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:56.095296 kubelet[1451]: E1213 14:18:56.095201 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bzpg8" podUID="cfc8d7f2-8854-4340-849a-9ba30c93a44e" Dec 13 14:18:56.492098 kubelet[1451]: E1213 14:18:56.491941 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:57.492767 kubelet[1451]: E1213 14:18:57.492700 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:58.095438 kubelet[1451]: E1213 14:18:58.095320 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bzpg8" podUID="cfc8d7f2-8854-4340-849a-9ba30c93a44e" Dec 13 14:18:58.493294 kubelet[1451]: E1213 14:18:58.493149 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:59.129715 env[1197]: time="2024-12-13T14:18:59.129646564Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:59.149998 env[1197]: time="2024-12-13T14:18:59.149938839Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:59.157214 env[1197]: time="2024-12-13T14:18:59.157154872Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:59.180913 env[1197]: time="2024-12-13T14:18:59.180866730Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:18:59.181309 env[1197]: time="2024-12-13T14:18:59.181255258Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:18:59.183604 env[1197]: time="2024-12-13T14:18:59.183575359Z" level=info msg="CreateContainer within sandbox \"9e8960656bca9d0d289716929258438e7cc2bdf77393506ce459c63a8647d05e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:18:59.494359 kubelet[1451]: E1213 14:18:59.493575 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:18:59.506319 env[1197]: time="2024-12-13T14:18:59.506185128Z" level=info msg="CreateContainer within sandbox \"9e8960656bca9d0d289716929258438e7cc2bdf77393506ce459c63a8647d05e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"dd2b7eee191065c786db59a89e37212765fd0f0a1d47eeaf1b58cdca7b73158d\"" Dec 13 14:18:59.506923 env[1197]: time="2024-12-13T14:18:59.506885241Z" level=info msg="StartContainer for \"dd2b7eee191065c786db59a89e37212765fd0f0a1d47eeaf1b58cdca7b73158d\"" Dec 13 14:18:59.574973 systemd[1]: Started cri-containerd-dd2b7eee191065c786db59a89e37212765fd0f0a1d47eeaf1b58cdca7b73158d.scope. Dec 13 14:18:59.609000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.612430 kernel: kauditd_printk_skb: 230 callbacks suppressed Dec 13 14:18:59.612483 kernel: audit: type=1400 audit(1734099539.609:507): avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.609000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f2453f5d198 items=0 ppid=1520 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:59.620854 kernel: audit: type=1300 audit(1734099539.609:507): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f2453f5d198 items=0 ppid=1520 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:59.620908 kernel: audit: type=1327 audit(1734099539.609:507): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464326237656565313931303635633738366462353961383965333732 Dec 13 14:18:59.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464326237656565313931303635633738366462353961383965333732 Dec 13 14:18:59.609000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.628475 kernel: audit: type=1400 audit(1734099539.609:508): avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.628526 kernel: audit: type=1400 audit(1734099539.609:508): avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.609000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.609000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.634642 kernel: audit: type=1400 audit(1734099539.609:508): avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.634706 kernel: audit: type=1400 audit(1734099539.609:508): avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.609000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.637843 kernel: audit: type=1400 audit(1734099539.609:508): avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.609000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.641124 kernel: audit: type=1400 audit(1734099539.609:508): avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.609000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.644085 kernel: audit: type=1400 audit(1734099539.609:508): avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.609000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.609000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.609000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.609000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.609000 audit: BPF prog-id=69 op=LOAD Dec 13 14:18:59.609000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002c7f98 items=0 ppid=1520 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:59.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464326237656565313931303635633738366462353961383965333732 Dec 13 14:18:59.614000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.614000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.614000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.614000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.614000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.614000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.614000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.614000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.614000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.614000 audit: BPF prog-id=70 op=LOAD Dec 13 14:18:59.614000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002c7fe8 items=0 ppid=1520 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:59.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464326237656565313931303635633738366462353961383965333732 Dec 13 14:18:59.620000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:18:59.620000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:18:59.620000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.620000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.620000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.620000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.620000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.620000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.620000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.620000 audit[1815]: AVC avc: denied { perfmon } for pid=1815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.620000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.620000 audit[1815]: AVC avc: denied { bpf } for pid=1815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:18:59.620000 audit: BPF prog-id=71 op=LOAD Dec 13 14:18:59.620000 audit[1815]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003a6078 items=0 ppid=1520 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:59.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464326237656565313931303635633738366462353961383965333732 Dec 13 14:18:59.686851 env[1197]: time="2024-12-13T14:18:59.686789966Z" level=info msg="StartContainer for \"dd2b7eee191065c786db59a89e37212765fd0f0a1d47eeaf1b58cdca7b73158d\" returns successfully" Dec 13 14:19:00.094949 kubelet[1451]: E1213 14:19:00.094869 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bzpg8" podUID="cfc8d7f2-8854-4340-849a-9ba30c93a44e" Dec 13 14:19:00.129023 kubelet[1451]: E1213 14:19:00.128983 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:19:00.494515 kubelet[1451]: E1213 14:19:00.494338 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:01.130464 kubelet[1451]: E1213 14:19:01.130418 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:19:01.495358 kubelet[1451]: E1213 14:19:01.495262 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:01.941573 systemd[1]: cri-containerd-dd2b7eee191065c786db59a89e37212765fd0f0a1d47eeaf1b58cdca7b73158d.scope: Deactivated successfully. Dec 13 14:19:01.949000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:19:01.956745 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-dd2b7eee191065c786db59a89e37212765fd0f0a1d47eeaf1b58cdca7b73158d-rootfs.mount: Deactivated successfully. Dec 13 14:19:01.981342 kubelet[1451]: I1213 14:19:01.981292 1451 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:19:02.100186 systemd[1]: Created slice kubepods-besteffort-podcfc8d7f2_8854_4340_849a_9ba30c93a44e.slice. Dec 13 14:19:02.102837 env[1197]: time="2024-12-13T14:19:02.102787464Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bzpg8,Uid:cfc8d7f2-8854-4340-849a-9ba30c93a44e,Namespace:calico-system,Attempt:0,}" Dec 13 14:19:02.496550 kubelet[1451]: E1213 14:19:02.496460 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:02.695757 kubelet[1451]: I1213 14:19:02.695699 1451 topology_manager.go:215] "Topology Admit Handler" podUID="3b528162-9bb1-45dc-8cce-d10e751eb6ae" podNamespace="default" podName="nginx-deployment-85f456d6dd-5md2d" Dec 13 14:19:02.700678 systemd[1]: Created slice kubepods-besteffort-pod3b528162_9bb1_45dc_8cce_d10e751eb6ae.slice. Dec 13 14:19:02.738314 kubelet[1451]: I1213 14:19:02.738277 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f8fl6\" (UniqueName: \"kubernetes.io/projected/3b528162-9bb1-45dc-8cce-d10e751eb6ae-kube-api-access-f8fl6\") pod \"nginx-deployment-85f456d6dd-5md2d\" (UID: \"3b528162-9bb1-45dc-8cce-d10e751eb6ae\") " pod="default/nginx-deployment-85f456d6dd-5md2d" Dec 13 14:19:02.945389 env[1197]: time="2024-12-13T14:19:02.945264449Z" level=info msg="shim disconnected" id=dd2b7eee191065c786db59a89e37212765fd0f0a1d47eeaf1b58cdca7b73158d Dec 13 14:19:02.945389 env[1197]: time="2024-12-13T14:19:02.945307680Z" level=warning msg="cleaning up after shim disconnected" id=dd2b7eee191065c786db59a89e37212765fd0f0a1d47eeaf1b58cdca7b73158d namespace=k8s.io Dec 13 14:19:02.945389 env[1197]: time="2024-12-13T14:19:02.945317038Z" level=info msg="cleaning up dead shim" Dec 13 14:19:02.951538 env[1197]: time="2024-12-13T14:19:02.951487660Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:19:02Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1858 runtime=io.containerd.runc.v2\n" Dec 13 14:19:03.003223 env[1197]: time="2024-12-13T14:19:03.003174351Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-5md2d,Uid:3b528162-9bb1-45dc-8cce-d10e751eb6ae,Namespace:default,Attempt:0,}" Dec 13 14:19:03.135301 kubelet[1451]: E1213 14:19:03.135262 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:19:03.136077 env[1197]: time="2024-12-13T14:19:03.136040082Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:19:03.342522 env[1197]: time="2024-12-13T14:19:03.341534337Z" level=error msg="Failed to destroy network for sandbox \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:19:03.343168 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da-shm.mount: Deactivated successfully. Dec 13 14:19:03.344168 env[1197]: time="2024-12-13T14:19:03.344116028Z" level=error msg="encountered an error cleaning up failed sandbox \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:19:03.344231 env[1197]: time="2024-12-13T14:19:03.344183655Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bzpg8,Uid:cfc8d7f2-8854-4340-849a-9ba30c93a44e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:19:03.344545 kubelet[1451]: E1213 14:19:03.344473 1451 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:19:03.344696 kubelet[1451]: E1213 14:19:03.344578 1451 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bzpg8" Dec 13 14:19:03.344696 kubelet[1451]: E1213 14:19:03.344622 1451 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bzpg8" Dec 13 14:19:03.344757 kubelet[1451]: E1213 14:19:03.344697 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-bzpg8_calico-system(cfc8d7f2-8854-4340-849a-9ba30c93a44e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-bzpg8_calico-system(cfc8d7f2-8854-4340-849a-9ba30c93a44e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bzpg8" podUID="cfc8d7f2-8854-4340-849a-9ba30c93a44e" Dec 13 14:19:03.370040 env[1197]: time="2024-12-13T14:19:03.369947682Z" level=error msg="Failed to destroy network for sandbox \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:19:03.370443 env[1197]: time="2024-12-13T14:19:03.370393047Z" level=error msg="encountered an error cleaning up failed sandbox \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:19:03.370491 env[1197]: time="2024-12-13T14:19:03.370462267Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-5md2d,Uid:3b528162-9bb1-45dc-8cce-d10e751eb6ae,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:19:03.370758 kubelet[1451]: E1213 14:19:03.370711 1451 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:19:03.370832 kubelet[1451]: E1213 14:19:03.370783 1451 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-5md2d" Dec 13 14:19:03.370832 kubelet[1451]: E1213 14:19:03.370803 1451 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-5md2d" Dec 13 14:19:03.370907 kubelet[1451]: E1213 14:19:03.370851 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-5md2d_default(3b528162-9bb1-45dc-8cce-d10e751eb6ae)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-5md2d_default(3b528162-9bb1-45dc-8cce-d10e751eb6ae)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-5md2d" podUID="3b528162-9bb1-45dc-8cce-d10e751eb6ae" Dec 13 14:19:03.483982 kubelet[1451]: E1213 14:19:03.483915 1451 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:03.496916 kubelet[1451]: E1213 14:19:03.496817 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:04.138443 kubelet[1451]: I1213 14:19:04.138117 1451 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Dec 13 14:19:04.139293 env[1197]: time="2024-12-13T14:19:04.139226633Z" level=info msg="StopPodSandbox for \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\"" Dec 13 14:19:04.139610 kubelet[1451]: I1213 14:19:04.139246 1451 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Dec 13 14:19:04.139758 env[1197]: time="2024-12-13T14:19:04.139726021Z" level=info msg="StopPodSandbox for \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\"" Dec 13 14:19:04.165609 env[1197]: time="2024-12-13T14:19:04.165543203Z" level=error msg="StopPodSandbox for \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\" failed" error="failed to destroy network for sandbox \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:19:04.165879 kubelet[1451]: E1213 14:19:04.165835 1451 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Dec 13 14:19:04.165944 kubelet[1451]: E1213 14:19:04.165888 1451 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da"} Dec 13 14:19:04.165983 kubelet[1451]: E1213 14:19:04.165941 1451 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cfc8d7f2-8854-4340-849a-9ba30c93a44e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:19:04.165983 kubelet[1451]: E1213 14:19:04.165964 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cfc8d7f2-8854-4340-849a-9ba30c93a44e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bzpg8" podUID="cfc8d7f2-8854-4340-849a-9ba30c93a44e" Dec 13 14:19:04.167658 env[1197]: time="2024-12-13T14:19:04.167589432Z" level=error msg="StopPodSandbox for \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\" failed" error="failed to destroy network for sandbox \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:19:04.167854 kubelet[1451]: E1213 14:19:04.167809 1451 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Dec 13 14:19:04.167854 kubelet[1451]: E1213 14:19:04.167840 1451 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb"} Dec 13 14:19:04.167931 kubelet[1451]: E1213 14:19:04.167859 1451 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3b528162-9bb1-45dc-8cce-d10e751eb6ae\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:19:04.167931 kubelet[1451]: E1213 14:19:04.167876 1451 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3b528162-9bb1-45dc-8cce-d10e751eb6ae\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-5md2d" podUID="3b528162-9bb1-45dc-8cce-d10e751eb6ae" Dec 13 14:19:04.171014 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb-shm.mount: Deactivated successfully. Dec 13 14:19:04.497808 kubelet[1451]: E1213 14:19:04.497639 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:05.498446 kubelet[1451]: E1213 14:19:05.498363 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:06.499178 kubelet[1451]: E1213 14:19:06.499099 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:07.366000 audit[1993]: NETFILTER_CFG table=filter:65 family=2 entries=16 op=nft_register_rule pid=1993 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:07.369277 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:19:07.369331 kernel: audit: type=1325 audit(1734099547.366:514): table=filter:65 family=2 entries=16 op=nft_register_rule pid=1993 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:07.366000 audit[1993]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff3c49e940 a2=0 a3=7fff3c49e92c items=0 ppid=1667 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:07.376879 kernel: audit: type=1300 audit(1734099547.366:514): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff3c49e940 a2=0 a3=7fff3c49e92c items=0 ppid=1667 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:07.377054 kernel: audit: type=1327 audit(1734099547.366:514): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:07.366000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:07.383000 audit[1993]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=1993 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:07.383000 audit[1993]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff3c49e940 a2=0 a3=0 items=0 ppid=1667 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:07.393010 kernel: audit: type=1325 audit(1734099547.383:515): table=nat:66 family=2 entries=14 op=nft_register_rule pid=1993 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:07.393075 kernel: audit: type=1300 audit(1734099547.383:515): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff3c49e940 a2=0 a3=0 items=0 ppid=1667 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:07.393101 kernel: audit: type=1327 audit(1734099547.383:515): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:07.383000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:07.405000 audit[1995]: NETFILTER_CFG table=filter:67 family=2 entries=13 op=nft_register_rule pid=1995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:07.405000 audit[1995]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe335bca20 a2=0 a3=7ffe335bca0c items=0 ppid=1667 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:07.414263 kernel: audit: type=1325 audit(1734099547.405:516): table=filter:67 family=2 entries=13 op=nft_register_rule pid=1995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:07.414327 kernel: audit: type=1300 audit(1734099547.405:516): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe335bca20 a2=0 a3=7ffe335bca0c items=0 ppid=1667 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:07.414365 kernel: audit: type=1327 audit(1734099547.405:516): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:07.405000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:07.417000 audit[1995]: NETFILTER_CFG table=nat:68 family=2 entries=35 op=nft_register_chain pid=1995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:07.417000 audit[1995]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe335bca20 a2=0 a3=7ffe335bca0c items=0 ppid=1667 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:07.417000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:07.422425 kernel: audit: type=1325 audit(1734099547.417:517): table=nat:68 family=2 entries=35 op=nft_register_chain pid=1995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:07.500267 kubelet[1451]: E1213 14:19:07.500218 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:08.501425 kubelet[1451]: E1213 14:19:08.501325 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:09.369000 audit[2000]: NETFILTER_CFG table=filter:69 family=2 entries=10 op=nft_register_rule pid=2000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:09.369000 audit[2000]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdc20fa030 a2=0 a3=7ffdc20fa01c items=0 ppid=1667 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:09.369000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:09.374000 audit[2000]: NETFILTER_CFG table=nat:70 family=2 entries=20 op=nft_register_rule pid=2000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:09.374000 audit[2000]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdc20fa030 a2=0 a3=7ffdc20fa01c items=0 ppid=1667 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:09.374000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:09.501798 kubelet[1451]: E1213 14:19:09.501730 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:10.502918 kubelet[1451]: E1213 14:19:10.502835 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:11.503566 kubelet[1451]: E1213 14:19:11.503505 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:11.758967 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1976333158.mount: Deactivated successfully. Dec 13 14:19:11.918486 env[1197]: time="2024-12-13T14:19:11.918390545Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:11.921922 env[1197]: time="2024-12-13T14:19:11.921865158Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:11.923620 env[1197]: time="2024-12-13T14:19:11.923584159Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:11.945723 env[1197]: time="2024-12-13T14:19:11.945634280Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:11.946334 env[1197]: time="2024-12-13T14:19:11.946258999Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:19:11.958696 env[1197]: time="2024-12-13T14:19:11.958637218Z" level=info msg="CreateContainer within sandbox \"9e8960656bca9d0d289716929258438e7cc2bdf77393506ce459c63a8647d05e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:19:11.977503 env[1197]: time="2024-12-13T14:19:11.977395172Z" level=info msg="CreateContainer within sandbox \"9e8960656bca9d0d289716929258438e7cc2bdf77393506ce459c63a8647d05e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4676c184e1e18cac8acdf1262bc0bfdee916fe125f8d3a3fb80fd6dc114dde6d\"" Dec 13 14:19:11.978166 env[1197]: time="2024-12-13T14:19:11.978106266Z" level=info msg="StartContainer for \"4676c184e1e18cac8acdf1262bc0bfdee916fe125f8d3a3fb80fd6dc114dde6d\"" Dec 13 14:19:12.029430 systemd[1]: Started cri-containerd-4676c184e1e18cac8acdf1262bc0bfdee916fe125f8d3a3fb80fd6dc114dde6d.scope. Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit[2012]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f1a0c3e94d8 items=0 ppid=1520 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:12.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436373663313834653165313863616338616364663132363262633062 Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit: BPF prog-id=72 op=LOAD Dec 13 14:19:12.119000 audit[2012]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000219188 items=0 ppid=1520 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:12.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436373663313834653165313863616338616364663132363262633062 Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.119000 audit: BPF prog-id=73 op=LOAD Dec 13 14:19:12.119000 audit[2012]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002191d8 items=0 ppid=1520 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:12.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436373663313834653165313863616338616364663132363262633062 Dec 13 14:19:12.119000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:19:12.119000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:19:12.120000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.120000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.120000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.120000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.120000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.120000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.120000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.120000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.120000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.120000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:12.120000 audit: BPF prog-id=74 op=LOAD Dec 13 14:19:12.120000 audit[2012]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000219268 items=0 ppid=1520 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:12.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436373663313834653165313863616338616364663132363262633062 Dec 13 14:19:12.134811 env[1197]: time="2024-12-13T14:19:12.134755521Z" level=info msg="StartContainer for \"4676c184e1e18cac8acdf1262bc0bfdee916fe125f8d3a3fb80fd6dc114dde6d\" returns successfully" Dec 13 14:19:12.157024 kubelet[1451]: E1213 14:19:12.156977 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:19:12.172178 kubelet[1451]: I1213 14:19:12.172081 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-h9kkt" podStartSLOduration=3.305245122 podStartE2EDuration="29.17205466s" podCreationTimestamp="2024-12-13 14:18:43 +0000 UTC" firstStartedPulling="2024-12-13 14:18:46.081459095 +0000 UTC m=+3.167422980" lastFinishedPulling="2024-12-13 14:19:11.948268623 +0000 UTC m=+29.034232518" observedRunningTime="2024-12-13 14:19:12.171904665 +0000 UTC m=+29.257868560" watchObservedRunningTime="2024-12-13 14:19:12.17205466 +0000 UTC m=+29.258018545" Dec 13 14:19:12.237920 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:19:12.238086 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:19:12.504429 kubelet[1451]: E1213 14:19:12.504353 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:13.158214 kubelet[1451]: E1213 14:19:13.158162 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:19:13.504658 kubelet[1451]: E1213 14:19:13.504603 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:13.517532 kernel: kauditd_printk_skb: 51 callbacks suppressed Dec 13 14:19:13.517678 kernel: audit: type=1400 audit(1734099553.507:526): avc: denied { write } for pid=2157 comm="tee" name="fd" dev="proc" ino=21545 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:19:13.507000 audit[2157]: AVC avc: denied { write } for pid=2157 comm="tee" name="fd" dev="proc" ino=21545 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:19:13.507000 audit[2149]: AVC avc: denied { write } for pid=2149 comm="tee" name="fd" dev="proc" ino=20686 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:19:13.522428 kernel: audit: type=1400 audit(1734099553.507:527): avc: denied { write } for pid=2149 comm="tee" name="fd" dev="proc" ino=20686 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:19:13.507000 audit[2149]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffacd68a1a a2=241 a3=1b6 items=1 ppid=2123 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.549686 kernel: audit: type=1300 audit(1734099553.507:527): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffacd68a1a a2=241 a3=1b6 items=1 ppid=2123 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.549737 kernel: audit: type=1307 audit(1734099553.507:527): cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:19:13.507000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:19:13.552883 kernel: audit: type=1302 audit(1734099553.507:527): item=0 name="/dev/fd/63" inode=21538 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:13.507000 audit: PATH item=0 name="/dev/fd/63" inode=21538 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:13.570874 kernel: audit: type=1327 audit(1734099553.507:527): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:19:13.507000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:19:13.573971 kernel: audit: type=1400 audit(1734099553.509:528): avc: denied { write } for pid=2169 comm="tee" name="fd" dev="proc" ino=19814 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:19:13.509000 audit[2169]: AVC avc: denied { write } for pid=2169 comm="tee" name="fd" dev="proc" ino=19814 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:19:13.578570 kernel: audit: type=1300 audit(1734099553.509:528): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3312ea2a a2=241 a3=1b6 items=1 ppid=2124 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.509000 audit[2169]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3312ea2a a2=241 a3=1b6 items=1 ppid=2124 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.579912 kernel: audit: type=1307 audit(1734099553.509:528): cwd="/etc/service/enabled/felix/log" Dec 13 14:19:13.509000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:19:13.583054 kernel: audit: type=1302 audit(1734099553.509:528): item=0 name="/dev/fd/63" inode=19808 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:13.509000 audit: PATH item=0 name="/dev/fd/63" inode=19808 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:13.509000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:19:13.507000 audit[2157]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee4515a2a a2=241 a3=1b6 items=1 ppid=2131 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.507000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:19:13.507000 audit: PATH item=0 name="/dev/fd/63" inode=21541 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:13.507000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:19:13.518000 audit[2171]: AVC avc: denied { write } for pid=2171 comm="tee" name="fd" dev="proc" ino=19820 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:19:13.518000 audit[2171]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdda625a2c a2=241 a3=1b6 items=1 ppid=2125 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.518000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:19:13.518000 audit: PATH item=0 name="/dev/fd/63" inode=19811 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:13.518000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:19:13.525000 audit[2188]: AVC avc: denied { write } for pid=2188 comm="tee" name="fd" dev="proc" ino=20702 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:19:13.525000 audit[2188]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc8ef0a1b a2=241 a3=1b6 items=1 ppid=2127 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.525000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:19:13.525000 audit: PATH item=0 name="/dev/fd/63" inode=20696 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:13.525000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:19:13.538000 audit[2185]: AVC avc: denied { write } for pid=2185 comm="tee" name="fd" dev="proc" ino=20707 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:19:13.538000 audit[2185]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc229f6a2b a2=241 a3=1b6 items=1 ppid=2135 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.538000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:19:13.538000 audit: PATH item=0 name="/dev/fd/63" inode=20693 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:13.538000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:19:13.547000 audit[2197]: AVC avc: denied { write } for pid=2197 comm="tee" name="fd" dev="proc" ino=19825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:19:13.547000 audit[2197]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc38e5da2a a2=241 a3=1b6 items=1 ppid=2136 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.547000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:19:13.547000 audit: PATH item=0 name="/dev/fd/63" inode=20699 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:13.547000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:19:13.668000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.668000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.668000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.668000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.668000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.668000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.668000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.668000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.668000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.668000 audit: BPF prog-id=75 op=LOAD Dec 13 14:19:13.668000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd2c1930a0 a2=98 a3=3 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.668000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.669000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:19:13.670000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.670000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.670000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.670000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.670000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.670000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.670000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.670000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.670000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.670000 audit: BPF prog-id=76 op=LOAD Dec 13 14:19:13.670000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd2c192e80 a2=74 a3=540051 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.670000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.671000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:19:13.671000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.671000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.671000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.671000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.671000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.671000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.671000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.671000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.671000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.671000 audit: BPF prog-id=77 op=LOAD Dec 13 14:19:13.671000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd2c192eb0 a2=94 a3=2 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.671000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.672000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:19:13.781000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.781000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.781000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.781000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.781000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.781000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.781000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.781000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.781000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.781000 audit: BPF prog-id=78 op=LOAD Dec 13 14:19:13.781000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd2c192d70 a2=40 a3=1 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.781000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.781000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:19:13.781000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.781000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd2c192e40 a2=50 a3=7ffd2c192f20 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.781000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.788000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.788000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2c192d80 a2=28 a3=0 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.788000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.788000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.788000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd2c192db0 a2=28 a3=0 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.788000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.788000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.788000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd2c192cc0 a2=28 a3=0 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.788000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.788000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.788000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2c192dd0 a2=28 a3=0 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.788000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.788000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.788000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2c192db0 a2=28 a3=0 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.788000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.788000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.788000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2c192da0 a2=28 a3=0 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.788000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.788000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.788000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2c192dd0 a2=28 a3=0 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.788000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.788000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.788000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd2c192db0 a2=28 a3=0 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.788000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.788000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.788000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd2c192dd0 a2=28 a3=0 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.788000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.788000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.788000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd2c192da0 a2=28 a3=0 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.788000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.788000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.788000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd2c192e10 a2=28 a3=0 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.788000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd2c192bc0 a2=50 a3=1 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.789000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit: BPF prog-id=79 op=LOAD Dec 13 14:19:13.789000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd2c192bc0 a2=94 a3=5 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.789000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.789000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd2c192c70 a2=50 a3=1 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.789000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd2c192d90 a2=4 a3=38 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.789000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { confidentiality } for pid=2240 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:13.789000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd2c192de0 a2=94 a3=6 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.789000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { confidentiality } for pid=2240 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:13.789000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd2c192590 a2=94 a3=83 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.789000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { perfmon } for pid=2240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { bpf } for pid=2240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.789000 audit[2240]: AVC avc: denied { confidentiality } for pid=2240 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:13.789000 audit[2240]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd2c192590 a2=94 a3=83 items=0 ppid=2128 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.789000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit: BPF prog-id=80 op=LOAD Dec 13 14:19:13.796000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcf5143130 a2=98 a3=1999999999999999 items=0 ppid=2128 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.796000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:19:13.796000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit: BPF prog-id=81 op=LOAD Dec 13 14:19:13.796000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcf5143010 a2=74 a3=ffff items=0 ppid=2128 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.796000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:19:13.796000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { perfmon } for pid=2243 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit[2243]: AVC avc: denied { bpf } for pid=2243 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.796000 audit: BPF prog-id=82 op=LOAD Dec 13 14:19:13.796000 audit[2243]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcf5143050 a2=40 a3=7ffcf5143230 items=0 ppid=2128 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.796000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:19:13.796000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:19:13.833889 systemd-networkd[1031]: vxlan.calico: Link UP Dec 13 14:19:13.833897 systemd-networkd[1031]: vxlan.calico: Gained carrier Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit: BPF prog-id=83 op=LOAD Dec 13 14:19:13.857000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2d788cc0 a2=98 a3=ffffffff items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.857000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:19:13.857000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit: BPF prog-id=84 op=LOAD Dec 13 14:19:13.857000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2d788ad0 a2=74 a3=540051 items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.857000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:19:13.857000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit: BPF prog-id=85 op=LOAD Dec 13 14:19:13.857000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2d788b00 a2=94 a3=2 items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.857000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:19:13.857000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2d7889d0 a2=28 a3=0 items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.857000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2d788a00 a2=28 a3=0 items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.857000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2d788910 a2=28 a3=0 items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.857000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:19:13.857000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.857000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2d788a20 a2=28 a3=0 items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.857000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:19:13.858000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.858000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2d788a00 a2=28 a3=0 items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.858000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:19:13.858000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.858000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2d7889f0 a2=28 a3=0 items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.858000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2d788a20 a2=28 a3=0 items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2d788a00 a2=28 a3=0 items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2d788a20 a2=28 a3=0 items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2d7889f0 a2=28 a3=0 items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2d788a60 a2=28 a3=0 items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit: BPF prog-id=86 op=LOAD Dec 13 14:19:13.859000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe2d7888d0 a2=40 a3=0 items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:19:13.859000 audit: BPF prog-id=86 op=UNLOAD Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe2d7888c0 a2=50 a3=2800 items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe2d7888c0 a2=50 a3=2800 items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit: BPF prog-id=87 op=LOAD Dec 13 14:19:13.859000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe2d7880e0 a2=94 a3=2 items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:19:13.859000 audit: BPF prog-id=87 op=UNLOAD Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.859000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe2d7881e0 a2=94 a3=2d items=0 ppid=2128 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:19:13.866000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.866000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.866000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.866000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.866000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.866000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.866000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.866000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.866000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.866000 audit: BPF prog-id=89 op=LOAD Dec 13 14:19:13.866000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc9fda2c50 a2=98 a3=0 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.866000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.866000 audit: BPF prog-id=89 op=UNLOAD Dec 13 14:19:13.867000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.867000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.867000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.867000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.867000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.867000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.867000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.867000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.867000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.867000 audit: BPF prog-id=90 op=LOAD Dec 13 14:19:13.867000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9fda2a30 a2=74 a3=540051 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.867000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.867000 audit: BPF prog-id=90 op=UNLOAD Dec 13 14:19:13.867000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.867000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.867000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.867000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.867000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.867000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.867000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.867000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.867000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.867000 audit: BPF prog-id=91 op=LOAD Dec 13 14:19:13.867000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9fda2a60 a2=94 a3=2 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.867000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.867000 audit: BPF prog-id=91 op=UNLOAD Dec 13 14:19:13.968000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.968000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.968000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.968000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.968000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.968000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.968000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.968000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.968000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.968000 audit: BPF prog-id=92 op=LOAD Dec 13 14:19:13.968000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9fda2920 a2=40 a3=1 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.968000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.968000 audit: BPF prog-id=92 op=UNLOAD Dec 13 14:19:13.968000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.968000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc9fda29f0 a2=50 a3=7ffc9fda2ad0 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.968000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.977000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.977000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9fda2930 a2=28 a3=0 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.977000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.977000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.977000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9fda2960 a2=28 a3=0 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.977000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.977000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.977000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9fda2870 a2=28 a3=0 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.977000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.977000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.977000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9fda2980 a2=28 a3=0 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.977000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.977000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.977000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9fda2960 a2=28 a3=0 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.977000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.977000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.977000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9fda2950 a2=28 a3=0 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.977000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.977000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.977000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9fda2980 a2=28 a3=0 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.977000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.977000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.977000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9fda2960 a2=28 a3=0 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.977000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.977000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.977000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9fda2980 a2=28 a3=0 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.977000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.977000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.977000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9fda2950 a2=28 a3=0 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.977000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.977000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.977000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9fda29c0 a2=28 a3=0 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.977000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.977000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.977000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc9fda2770 a2=50 a3=1 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.977000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit: BPF prog-id=93 op=LOAD Dec 13 14:19:13.978000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc9fda2770 a2=94 a3=5 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.978000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.978000 audit: BPF prog-id=93 op=UNLOAD Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc9fda2820 a2=50 a3=1 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.978000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc9fda2940 a2=4 a3=38 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.978000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { confidentiality } for pid=2274 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:13.978000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9fda2990 a2=94 a3=6 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.978000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { confidentiality } for pid=2274 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:13.978000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9fda2140 a2=94 a3=83 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.978000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.978000 audit[2274]: AVC avc: denied { confidentiality } for pid=2274 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:13.978000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9fda2140 a2=94 a3=83 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.978000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.979000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.979000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9fda3b80 a2=10 a3=208 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.979000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.979000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.979000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9fda3a20 a2=10 a3=3 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.979000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.979000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.979000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9fda39c0 a2=10 a3=3 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.979000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.979000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:13.979000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9fda39c0 a2=10 a3=7 items=0 ppid=2128 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:13.979000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:19:13.986000 audit: BPF prog-id=88 op=UNLOAD Dec 13 14:19:14.027000 audit[2300]: NETFILTER_CFG table=mangle:71 family=2 entries=16 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:19:14.027000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff779107d0 a2=0 a3=7fff779107bc items=0 ppid=2128 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:14.027000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:19:14.033000 audit[2302]: NETFILTER_CFG table=nat:72 family=2 entries=15 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:19:14.033000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd982cb1b0 a2=0 a3=7ffd982cb19c items=0 ppid=2128 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:14.033000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:19:14.036000 audit[2301]: NETFILTER_CFG table=raw:73 family=2 entries=21 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:19:14.036000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff326d2270 a2=0 a3=7fff326d225c items=0 ppid=2128 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:14.036000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:19:14.041000 audit[2305]: NETFILTER_CFG table=filter:74 family=2 entries=39 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:19:14.041000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe5b7dd5f0 a2=0 a3=7ffe5b7dd5dc items=0 ppid=2128 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:14.041000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:19:14.505225 kubelet[1451]: E1213 14:19:14.505166 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:14.853622 systemd-networkd[1031]: vxlan.calico: Gained IPv6LL Dec 13 14:19:15.397000 audit[2313]: NETFILTER_CFG table=filter:75 family=2 entries=10 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:15.397000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc02f67c00 a2=0 a3=7ffc02f67bec items=0 ppid=1667 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:15.397000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:15.404000 audit[2313]: NETFILTER_CFG table=nat:76 family=2 entries=44 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:15.404000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc02f67c00 a2=0 a3=7ffc02f67bec items=0 ppid=1667 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:15.404000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:15.419000 audit[2315]: NETFILTER_CFG table=filter:77 family=2 entries=10 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:15.419000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcfa62c0f0 a2=0 a3=7ffcfa62c0dc items=0 ppid=1667 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:15.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:15.431000 audit[2315]: NETFILTER_CFG table=nat:78 family=2 entries=56 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:15.431000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffcfa62c0f0 a2=0 a3=7ffcfa62c0dc items=0 ppid=1667 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:15.431000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:15.506294 kubelet[1451]: E1213 14:19:15.506207 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:16.095784 env[1197]: time="2024-12-13T14:19:16.095706528Z" level=info msg="StopPodSandbox for \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\"" Dec 13 14:19:16.178189 env[1197]: 2024-12-13 14:19:16.146 [INFO][2335] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Dec 13 14:19:16.178189 env[1197]: 2024-12-13 14:19:16.146 [INFO][2335] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" iface="eth0" netns="/var/run/netns/cni-fbb450c8-4b58-b1ff-7a75-6e1ce659e7cf" Dec 13 14:19:16.178189 env[1197]: 2024-12-13 14:19:16.146 [INFO][2335] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" iface="eth0" netns="/var/run/netns/cni-fbb450c8-4b58-b1ff-7a75-6e1ce659e7cf" Dec 13 14:19:16.178189 env[1197]: 2024-12-13 14:19:16.146 [INFO][2335] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" iface="eth0" netns="/var/run/netns/cni-fbb450c8-4b58-b1ff-7a75-6e1ce659e7cf" Dec 13 14:19:16.178189 env[1197]: 2024-12-13 14:19:16.146 [INFO][2335] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Dec 13 14:19:16.178189 env[1197]: 2024-12-13 14:19:16.146 [INFO][2335] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Dec 13 14:19:16.178189 env[1197]: 2024-12-13 14:19:16.165 [INFO][2342] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" HandleID="k8s-pod-network.2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Workload="10.0.0.25-k8s-csi--node--driver--bzpg8-eth0" Dec 13 14:19:16.178189 env[1197]: 2024-12-13 14:19:16.166 [INFO][2342] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:19:16.178189 env[1197]: 2024-12-13 14:19:16.166 [INFO][2342] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:19:16.178189 env[1197]: 2024-12-13 14:19:16.172 [WARNING][2342] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" HandleID="k8s-pod-network.2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Workload="10.0.0.25-k8s-csi--node--driver--bzpg8-eth0" Dec 13 14:19:16.178189 env[1197]: 2024-12-13 14:19:16.172 [INFO][2342] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" HandleID="k8s-pod-network.2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Workload="10.0.0.25-k8s-csi--node--driver--bzpg8-eth0" Dec 13 14:19:16.178189 env[1197]: 2024-12-13 14:19:16.174 [INFO][2342] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:19:16.178189 env[1197]: 2024-12-13 14:19:16.177 [INFO][2335] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Dec 13 14:19:16.180244 env[1197]: time="2024-12-13T14:19:16.178352424Z" level=info msg="TearDown network for sandbox \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\" successfully" Dec 13 14:19:16.180244 env[1197]: time="2024-12-13T14:19:16.178391979Z" level=info msg="StopPodSandbox for \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\" returns successfully" Dec 13 14:19:16.180244 env[1197]: time="2024-12-13T14:19:16.179245307Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bzpg8,Uid:cfc8d7f2-8854-4340-849a-9ba30c93a44e,Namespace:calico-system,Attempt:1,}" Dec 13 14:19:16.179926 systemd[1]: run-netns-cni\x2dfbb450c8\x2d4b58\x2db1ff\x2d7a75\x2d6e1ce659e7cf.mount: Deactivated successfully. Dec 13 14:19:16.200009 update_engine[1194]: I1213 14:19:16.199952 1194 update_attempter.cc:509] Updating boot flags... Dec 13 14:19:16.506734 kubelet[1451]: E1213 14:19:16.506672 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:16.751469 systemd-networkd[1031]: cali0b9f4187d31: Link UP Dec 13 14:19:16.753633 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:19:16.753699 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0b9f4187d31: link becomes ready Dec 13 14:19:16.753832 systemd-networkd[1031]: cali0b9f4187d31: Gained carrier Dec 13 14:19:16.766487 env[1197]: 2024-12-13 14:19:16.589 [INFO][2356] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.25-k8s-csi--node--driver--bzpg8-eth0 csi-node-driver- calico-system cfc8d7f2-8854-4340-849a-9ba30c93a44e 1055 0 2024-12-13 14:18:43 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.25 csi-node-driver-bzpg8 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali0b9f4187d31 [] []}} ContainerID="af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6" Namespace="calico-system" Pod="csi-node-driver-bzpg8" WorkloadEndpoint="10.0.0.25-k8s-csi--node--driver--bzpg8-" Dec 13 14:19:16.766487 env[1197]: 2024-12-13 14:19:16.589 [INFO][2356] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6" Namespace="calico-system" Pod="csi-node-driver-bzpg8" WorkloadEndpoint="10.0.0.25-k8s-csi--node--driver--bzpg8-eth0" Dec 13 14:19:16.766487 env[1197]: 2024-12-13 14:19:16.615 [INFO][2371] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6" HandleID="k8s-pod-network.af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6" Workload="10.0.0.25-k8s-csi--node--driver--bzpg8-eth0" Dec 13 14:19:16.766487 env[1197]: 2024-12-13 14:19:16.624 [INFO][2371] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6" HandleID="k8s-pod-network.af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6" Workload="10.0.0.25-k8s-csi--node--driver--bzpg8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001a1cd0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.25", "pod":"csi-node-driver-bzpg8", "timestamp":"2024-12-13 14:19:16.615651868 +0000 UTC"}, Hostname:"10.0.0.25", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:19:16.766487 env[1197]: 2024-12-13 14:19:16.624 [INFO][2371] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:19:16.766487 env[1197]: 2024-12-13 14:19:16.624 [INFO][2371] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:19:16.766487 env[1197]: 2024-12-13 14:19:16.624 [INFO][2371] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.25' Dec 13 14:19:16.766487 env[1197]: 2024-12-13 14:19:16.626 [INFO][2371] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6" host="10.0.0.25" Dec 13 14:19:16.766487 env[1197]: 2024-12-13 14:19:16.630 [INFO][2371] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.25" Dec 13 14:19:16.766487 env[1197]: 2024-12-13 14:19:16.635 [INFO][2371] ipam/ipam.go 489: Trying affinity for 192.168.34.0/26 host="10.0.0.25" Dec 13 14:19:16.766487 env[1197]: 2024-12-13 14:19:16.637 [INFO][2371] ipam/ipam.go 155: Attempting to load block cidr=192.168.34.0/26 host="10.0.0.25" Dec 13 14:19:16.766487 env[1197]: 2024-12-13 14:19:16.642 [INFO][2371] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.0/26 host="10.0.0.25" Dec 13 14:19:16.766487 env[1197]: 2024-12-13 14:19:16.642 [INFO][2371] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.0/26 handle="k8s-pod-network.af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6" host="10.0.0.25" Dec 13 14:19:16.766487 env[1197]: 2024-12-13 14:19:16.644 [INFO][2371] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6 Dec 13 14:19:16.766487 env[1197]: 2024-12-13 14:19:16.711 [INFO][2371] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.34.0/26 handle="k8s-pod-network.af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6" host="10.0.0.25" Dec 13 14:19:16.766487 env[1197]: 2024-12-13 14:19:16.747 [INFO][2371] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.34.1/26] block=192.168.34.0/26 handle="k8s-pod-network.af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6" host="10.0.0.25" Dec 13 14:19:16.766487 env[1197]: 2024-12-13 14:19:16.747 [INFO][2371] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.1/26] handle="k8s-pod-network.af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6" host="10.0.0.25" Dec 13 14:19:16.766487 env[1197]: 2024-12-13 14:19:16.747 [INFO][2371] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:19:16.766487 env[1197]: 2024-12-13 14:19:16.747 [INFO][2371] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.1/26] IPv6=[] ContainerID="af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6" HandleID="k8s-pod-network.af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6" Workload="10.0.0.25-k8s-csi--node--driver--bzpg8-eth0" Dec 13 14:19:16.767147 env[1197]: 2024-12-13 14:19:16.749 [INFO][2356] cni-plugin/k8s.go 386: Populated endpoint ContainerID="af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6" Namespace="calico-system" Pod="csi-node-driver-bzpg8" WorkloadEndpoint="10.0.0.25-k8s-csi--node--driver--bzpg8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.25-k8s-csi--node--driver--bzpg8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cfc8d7f2-8854-4340-849a-9ba30c93a44e", ResourceVersion:"1055", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.25", ContainerID:"", Pod:"csi-node-driver-bzpg8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.34.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0b9f4187d31", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:19:16.767147 env[1197]: 2024-12-13 14:19:16.749 [INFO][2356] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.34.1/32] ContainerID="af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6" Namespace="calico-system" Pod="csi-node-driver-bzpg8" WorkloadEndpoint="10.0.0.25-k8s-csi--node--driver--bzpg8-eth0" Dec 13 14:19:16.767147 env[1197]: 2024-12-13 14:19:16.749 [INFO][2356] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0b9f4187d31 ContainerID="af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6" Namespace="calico-system" Pod="csi-node-driver-bzpg8" WorkloadEndpoint="10.0.0.25-k8s-csi--node--driver--bzpg8-eth0" Dec 13 14:19:16.767147 env[1197]: 2024-12-13 14:19:16.753 [INFO][2356] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6" Namespace="calico-system" Pod="csi-node-driver-bzpg8" WorkloadEndpoint="10.0.0.25-k8s-csi--node--driver--bzpg8-eth0" Dec 13 14:19:16.767147 env[1197]: 2024-12-13 14:19:16.754 [INFO][2356] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6" Namespace="calico-system" Pod="csi-node-driver-bzpg8" WorkloadEndpoint="10.0.0.25-k8s-csi--node--driver--bzpg8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.25-k8s-csi--node--driver--bzpg8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cfc8d7f2-8854-4340-849a-9ba30c93a44e", ResourceVersion:"1055", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.25", ContainerID:"af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6", Pod:"csi-node-driver-bzpg8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.34.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0b9f4187d31", MAC:"62:48:c7:82:16:16", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:19:16.767147 env[1197]: 2024-12-13 14:19:16.764 [INFO][2356] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6" Namespace="calico-system" Pod="csi-node-driver-bzpg8" WorkloadEndpoint="10.0.0.25-k8s-csi--node--driver--bzpg8-eth0" Dec 13 14:19:16.775000 audit[2391]: NETFILTER_CFG table=filter:79 family=2 entries=34 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:19:16.775000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff894f95c0 a2=0 a3=7fff894f95ac items=0 ppid=2128 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:16.775000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:19:16.779006 env[1197]: time="2024-12-13T14:19:16.778928473Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:19:16.779006 env[1197]: time="2024-12-13T14:19:16.778979499Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:19:16.779006 env[1197]: time="2024-12-13T14:19:16.778996050Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:19:16.779252 env[1197]: time="2024-12-13T14:19:16.779163929Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6 pid=2399 runtime=io.containerd.runc.v2 Dec 13 14:19:16.795856 systemd[1]: run-containerd-runc-k8s.io-af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6-runc.l42L4J.mount: Deactivated successfully. Dec 13 14:19:16.797205 systemd[1]: Started cri-containerd-af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6.scope. Dec 13 14:19:16.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.806000 audit: BPF prog-id=94 op=LOAD Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2399 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:16.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353634336363303139326334616663313732323565383632346663 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2399 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:16.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353634336363303139326334616663313732323565383632346663 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit: BPF prog-id=95 op=LOAD Dec 13 14:19:16.807000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00025bce0 items=0 ppid=2399 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:16.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353634336363303139326334616663313732323565383632346663 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit: BPF prog-id=96 op=LOAD Dec 13 14:19:16.807000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00025bd28 items=0 ppid=2399 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:16.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353634336363303139326334616663313732323565383632346663 Dec 13 14:19:16.807000 audit: BPF prog-id=96 op=UNLOAD Dec 13 14:19:16.807000 audit: BPF prog-id=95 op=UNLOAD Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:16.807000 audit: BPF prog-id=97 op=LOAD Dec 13 14:19:16.807000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c6138 items=0 ppid=2399 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:16.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353634336363303139326334616663313732323565383632346663 Dec 13 14:19:16.808758 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:19:16.816599 env[1197]: time="2024-12-13T14:19:16.816537726Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bzpg8,Uid:cfc8d7f2-8854-4340-849a-9ba30c93a44e,Namespace:calico-system,Attempt:1,} returns sandbox id \"af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6\"" Dec 13 14:19:16.818927 env[1197]: time="2024-12-13T14:19:16.818901888Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:19:17.095348 env[1197]: time="2024-12-13T14:19:17.095194169Z" level=info msg="StopPodSandbox for \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\"" Dec 13 14:19:17.166637 env[1197]: 2024-12-13 14:19:17.136 [INFO][2448] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Dec 13 14:19:17.166637 env[1197]: 2024-12-13 14:19:17.136 [INFO][2448] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" iface="eth0" netns="/var/run/netns/cni-afeea037-fbf0-0652-8527-e6a5c726acf9" Dec 13 14:19:17.166637 env[1197]: 2024-12-13 14:19:17.137 [INFO][2448] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" iface="eth0" netns="/var/run/netns/cni-afeea037-fbf0-0652-8527-e6a5c726acf9" Dec 13 14:19:17.166637 env[1197]: 2024-12-13 14:19:17.137 [INFO][2448] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" iface="eth0" netns="/var/run/netns/cni-afeea037-fbf0-0652-8527-e6a5c726acf9" Dec 13 14:19:17.166637 env[1197]: 2024-12-13 14:19:17.137 [INFO][2448] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Dec 13 14:19:17.166637 env[1197]: 2024-12-13 14:19:17.137 [INFO][2448] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Dec 13 14:19:17.166637 env[1197]: 2024-12-13 14:19:17.155 [INFO][2455] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" HandleID="k8s-pod-network.cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Workload="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0" Dec 13 14:19:17.166637 env[1197]: 2024-12-13 14:19:17.155 [INFO][2455] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:19:17.166637 env[1197]: 2024-12-13 14:19:17.155 [INFO][2455] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:19:17.166637 env[1197]: 2024-12-13 14:19:17.161 [WARNING][2455] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" HandleID="k8s-pod-network.cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Workload="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0" Dec 13 14:19:17.166637 env[1197]: 2024-12-13 14:19:17.161 [INFO][2455] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" HandleID="k8s-pod-network.cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Workload="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0" Dec 13 14:19:17.166637 env[1197]: 2024-12-13 14:19:17.163 [INFO][2455] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:19:17.166637 env[1197]: 2024-12-13 14:19:17.165 [INFO][2448] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Dec 13 14:19:17.167613 env[1197]: time="2024-12-13T14:19:17.166808213Z" level=info msg="TearDown network for sandbox \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\" successfully" Dec 13 14:19:17.167613 env[1197]: time="2024-12-13T14:19:17.166844332Z" level=info msg="StopPodSandbox for \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\" returns successfully" Dec 13 14:19:17.167613 env[1197]: time="2024-12-13T14:19:17.167418219Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-5md2d,Uid:3b528162-9bb1-45dc-8cce-d10e751eb6ae,Namespace:default,Attempt:1,}" Dec 13 14:19:17.180507 systemd[1]: run-netns-cni\x2dafeea037\x2dfbf0\x2d0652\x2d8527\x2de6a5c726acf9.mount: Deactivated successfully. Dec 13 14:19:17.301748 systemd-networkd[1031]: calieebadfdb9e9: Link UP Dec 13 14:19:17.303779 systemd-networkd[1031]: calieebadfdb9e9: Gained carrier Dec 13 14:19:17.304534 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calieebadfdb9e9: link becomes ready Dec 13 14:19:17.312812 env[1197]: 2024-12-13 14:19:17.225 [INFO][2462] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0 nginx-deployment-85f456d6dd- default 3b528162-9bb1-45dc-8cce-d10e751eb6ae 1074 0 2024-12-13 14:19:02 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.25 nginx-deployment-85f456d6dd-5md2d eth0 default [] [] [kns.default ksa.default.default] calieebadfdb9e9 [] []}} ContainerID="72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c" Namespace="default" Pod="nginx-deployment-85f456d6dd-5md2d" WorkloadEndpoint="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-" Dec 13 14:19:17.312812 env[1197]: 2024-12-13 14:19:17.226 [INFO][2462] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c" Namespace="default" Pod="nginx-deployment-85f456d6dd-5md2d" WorkloadEndpoint="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0" Dec 13 14:19:17.312812 env[1197]: 2024-12-13 14:19:17.251 [INFO][2476] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c" HandleID="k8s-pod-network.72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c" Workload="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0" Dec 13 14:19:17.312812 env[1197]: 2024-12-13 14:19:17.261 [INFO][2476] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c" HandleID="k8s-pod-network.72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c" Workload="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dd290), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.25", "pod":"nginx-deployment-85f456d6dd-5md2d", "timestamp":"2024-12-13 14:19:17.251777437 +0000 UTC"}, Hostname:"10.0.0.25", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:19:17.312812 env[1197]: 2024-12-13 14:19:17.261 [INFO][2476] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:19:17.312812 env[1197]: 2024-12-13 14:19:17.262 [INFO][2476] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:19:17.312812 env[1197]: 2024-12-13 14:19:17.262 [INFO][2476] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.25' Dec 13 14:19:17.312812 env[1197]: 2024-12-13 14:19:17.264 [INFO][2476] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c" host="10.0.0.25" Dec 13 14:19:17.312812 env[1197]: 2024-12-13 14:19:17.271 [INFO][2476] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.25" Dec 13 14:19:17.312812 env[1197]: 2024-12-13 14:19:17.278 [INFO][2476] ipam/ipam.go 489: Trying affinity for 192.168.34.0/26 host="10.0.0.25" Dec 13 14:19:17.312812 env[1197]: 2024-12-13 14:19:17.280 [INFO][2476] ipam/ipam.go 155: Attempting to load block cidr=192.168.34.0/26 host="10.0.0.25" Dec 13 14:19:17.312812 env[1197]: 2024-12-13 14:19:17.282 [INFO][2476] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.0/26 host="10.0.0.25" Dec 13 14:19:17.312812 env[1197]: 2024-12-13 14:19:17.282 [INFO][2476] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.0/26 handle="k8s-pod-network.72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c" host="10.0.0.25" Dec 13 14:19:17.312812 env[1197]: 2024-12-13 14:19:17.284 [INFO][2476] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c Dec 13 14:19:17.312812 env[1197]: 2024-12-13 14:19:17.290 [INFO][2476] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.34.0/26 handle="k8s-pod-network.72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c" host="10.0.0.25" Dec 13 14:19:17.312812 env[1197]: 2024-12-13 14:19:17.295 [INFO][2476] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.34.2/26] block=192.168.34.0/26 handle="k8s-pod-network.72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c" host="10.0.0.25" Dec 13 14:19:17.312812 env[1197]: 2024-12-13 14:19:17.296 [INFO][2476] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.2/26] handle="k8s-pod-network.72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c" host="10.0.0.25" Dec 13 14:19:17.312812 env[1197]: 2024-12-13 14:19:17.296 [INFO][2476] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:19:17.312812 env[1197]: 2024-12-13 14:19:17.296 [INFO][2476] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.2/26] IPv6=[] ContainerID="72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c" HandleID="k8s-pod-network.72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c" Workload="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0" Dec 13 14:19:17.313560 env[1197]: 2024-12-13 14:19:17.298 [INFO][2462] cni-plugin/k8s.go 386: Populated endpoint ContainerID="72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c" Namespace="default" Pod="nginx-deployment-85f456d6dd-5md2d" WorkloadEndpoint="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"3b528162-9bb1-45dc-8cce-d10e751eb6ae", ResourceVersion:"1074", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 19, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.25", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-5md2d", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calieebadfdb9e9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:19:17.313560 env[1197]: 2024-12-13 14:19:17.299 [INFO][2462] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.34.2/32] ContainerID="72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c" Namespace="default" Pod="nginx-deployment-85f456d6dd-5md2d" WorkloadEndpoint="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0" Dec 13 14:19:17.313560 env[1197]: 2024-12-13 14:19:17.299 [INFO][2462] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calieebadfdb9e9 ContainerID="72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c" Namespace="default" Pod="nginx-deployment-85f456d6dd-5md2d" WorkloadEndpoint="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0" Dec 13 14:19:17.313560 env[1197]: 2024-12-13 14:19:17.303 [INFO][2462] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c" Namespace="default" Pod="nginx-deployment-85f456d6dd-5md2d" WorkloadEndpoint="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0" Dec 13 14:19:17.313560 env[1197]: 2024-12-13 14:19:17.304 [INFO][2462] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c" Namespace="default" Pod="nginx-deployment-85f456d6dd-5md2d" WorkloadEndpoint="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"3b528162-9bb1-45dc-8cce-d10e751eb6ae", ResourceVersion:"1074", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 19, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.25", ContainerID:"72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c", Pod:"nginx-deployment-85f456d6dd-5md2d", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calieebadfdb9e9", MAC:"22:84:b4:d3:df:f5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:19:17.313560 env[1197]: 2024-12-13 14:19:17.311 [INFO][2462] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c" Namespace="default" Pod="nginx-deployment-85f456d6dd-5md2d" WorkloadEndpoint="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0" Dec 13 14:19:17.322000 audit[2503]: NETFILTER_CFG table=filter:80 family=2 entries=38 op=nft_register_chain pid=2503 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:19:17.322000 audit[2503]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffc614bc790 a2=0 a3=7ffc614bc77c items=0 ppid=2128 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:17.322000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:19:17.324660 env[1197]: time="2024-12-13T14:19:17.324594200Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:19:17.324756 env[1197]: time="2024-12-13T14:19:17.324636700Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:19:17.324756 env[1197]: time="2024-12-13T14:19:17.324646569Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:19:17.325018 env[1197]: time="2024-12-13T14:19:17.324963349Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c pid=2506 runtime=io.containerd.runc.v2 Dec 13 14:19:17.337233 systemd[1]: Started cri-containerd-72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c.scope. Dec 13 14:19:17.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.348000 audit: BPF prog-id=98 op=LOAD Dec 13 14:19:17.348000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.348000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2506 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:17.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732623534666566346261616136666132613565666634323361313563 Dec 13 14:19:17.348000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.348000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2506 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:17.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732623534666566346261616136666132613565666634323361313563 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit: BPF prog-id=99 op=LOAD Dec 13 14:19:17.349000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a1200 items=0 ppid=2506 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:17.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732623534666566346261616136666132613565666634323361313563 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit: BPF prog-id=100 op=LOAD Dec 13 14:19:17.349000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a1248 items=0 ppid=2506 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:17.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732623534666566346261616136666132613565666634323361313563 Dec 13 14:19:17.349000 audit: BPF prog-id=100 op=UNLOAD Dec 13 14:19:17.349000 audit: BPF prog-id=99 op=UNLOAD Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:17.349000 audit: BPF prog-id=101 op=LOAD Dec 13 14:19:17.349000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a1658 items=0 ppid=2506 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:17.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732623534666566346261616136666132613565666634323361313563 Dec 13 14:19:17.350879 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:19:17.374318 env[1197]: time="2024-12-13T14:19:17.374263522Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-5md2d,Uid:3b528162-9bb1-45dc-8cce-d10e751eb6ae,Namespace:default,Attempt:1,} returns sandbox id \"72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c\"" Dec 13 14:19:17.411000 audit[2539]: NETFILTER_CFG table=filter:81 family=2 entries=10 op=nft_register_rule pid=2539 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:17.411000 audit[2539]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffa0923070 a2=0 a3=7fffa092305c items=0 ppid=1667 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:17.411000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:17.415000 audit[2539]: NETFILTER_CFG table=nat:82 family=2 entries=20 op=nft_register_rule pid=2539 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:17.415000 audit[2539]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffa0923070 a2=0 a3=7fffa092305c items=0 ppid=1667 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:17.415000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:17.507027 kubelet[1451]: E1213 14:19:17.506936 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:18.501584 systemd-networkd[1031]: cali0b9f4187d31: Gained IPv6LL Dec 13 14:19:18.507863 kubelet[1451]: E1213 14:19:18.507817 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:18.949571 systemd-networkd[1031]: calieebadfdb9e9: Gained IPv6LL Dec 13 14:19:19.278280 env[1197]: time="2024-12-13T14:19:19.278104764Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:19.279963 env[1197]: time="2024-12-13T14:19:19.279924927Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:19.281336 env[1197]: time="2024-12-13T14:19:19.281281564Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:19.282958 env[1197]: time="2024-12-13T14:19:19.282922499Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:19.283393 env[1197]: time="2024-12-13T14:19:19.283350960Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:19:19.285116 env[1197]: time="2024-12-13T14:19:19.285083328Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:19:19.286000 env[1197]: time="2024-12-13T14:19:19.285947202Z" level=info msg="CreateContainer within sandbox \"af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:19:19.301223 env[1197]: time="2024-12-13T14:19:19.301164875Z" level=info msg="CreateContainer within sandbox \"af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"df20ecee8ad6dcc63e5f9c275311e3544db55fc47a7421512652f4b3e4752cb6\"" Dec 13 14:19:19.301826 env[1197]: time="2024-12-13T14:19:19.301792091Z" level=info msg="StartContainer for \"df20ecee8ad6dcc63e5f9c275311e3544db55fc47a7421512652f4b3e4752cb6\"" Dec 13 14:19:19.319388 systemd[1]: Started cri-containerd-df20ecee8ad6dcc63e5f9c275311e3544db55fc47a7421512652f4b3e4752cb6.scope. Dec 13 14:19:19.333746 kernel: kauditd_printk_skb: 651 callbacks suppressed Dec 13 14:19:19.333868 kernel: audit: type=1400 audit(1734099559.330:672): avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.330000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.330000 audit[2554]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fbce5371018 items=0 ppid=2399 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:19.339846 kernel: audit: type=1300 audit(1734099559.330:672): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fbce5371018 items=0 ppid=2399 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:19.339889 kernel: audit: type=1327 audit(1734099559.330:672): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323065636565386164366463633633653566396332373533313165 Dec 13 14:19:19.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323065636565386164366463633633653566396332373533313165 Dec 13 14:19:19.330000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.346853 kernel: audit: type=1400 audit(1734099559.330:673): avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.346894 kernel: audit: type=1400 audit(1734099559.330:673): avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.330000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.350166 kernel: audit: type=1400 audit(1734099559.330:673): avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.330000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.357254 kernel: audit: type=1400 audit(1734099559.330:673): avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.330000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.330000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.330000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.363380 env[1197]: time="2024-12-13T14:19:19.363312643Z" level=info msg="StartContainer for \"df20ecee8ad6dcc63e5f9c275311e3544db55fc47a7421512652f4b3e4752cb6\" returns successfully" Dec 13 14:19:19.364871 kernel: audit: type=1400 audit(1734099559.330:673): avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.364918 kernel: audit: type=1400 audit(1734099559.330:673): avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.364956 kernel: audit: type=1400 audit(1734099559.330:673): avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.330000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.330000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.330000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.330000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.330000 audit: BPF prog-id=102 op=LOAD Dec 13 14:19:19.330000 audit[2554]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001fb748 items=0 ppid=2399 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:19.330000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323065636565386164366463633633653566396332373533313165 Dec 13 14:19:19.334000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.334000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.334000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.334000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.334000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.334000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.334000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.334000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.334000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.334000 audit: BPF prog-id=103 op=LOAD Dec 13 14:19:19.334000 audit[2554]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fb798 items=0 ppid=2399 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:19.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323065636565386164366463633633653566396332373533313165 Dec 13 14:19:19.339000 audit: BPF prog-id=103 op=UNLOAD Dec 13 14:19:19.339000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:19:19.339000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.339000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.339000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.339000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.339000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.339000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.339000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.339000 audit[2554]: AVC avc: denied { perfmon } for pid=2554 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.339000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.339000 audit[2554]: AVC avc: denied { bpf } for pid=2554 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:19.339000 audit: BPF prog-id=104 op=LOAD Dec 13 14:19:19.339000 audit[2554]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fb828 items=0 ppid=2399 pid=2554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:19.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466323065636565386164366463633633653566396332373533313165 Dec 13 14:19:19.508147 kubelet[1451]: E1213 14:19:19.508076 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:20.508700 kubelet[1451]: E1213 14:19:20.508638 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:21.509699 kubelet[1451]: E1213 14:19:21.509631 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:22.106489 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3832041814.mount: Deactivated successfully. Dec 13 14:19:22.510767 kubelet[1451]: E1213 14:19:22.510702 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:23.484188 kubelet[1451]: E1213 14:19:23.484119 1451 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:23.511540 kubelet[1451]: E1213 14:19:23.511484 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:23.930130 env[1197]: time="2024-12-13T14:19:23.929978599Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:23.954039 env[1197]: time="2024-12-13T14:19:23.953973026Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:23.961090 env[1197]: time="2024-12-13T14:19:23.961054599Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:23.964614 env[1197]: time="2024-12-13T14:19:23.964544769Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:23.965459 env[1197]: time="2024-12-13T14:19:23.965420222Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:19:23.966831 env[1197]: time="2024-12-13T14:19:23.966788065Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:19:23.968347 env[1197]: time="2024-12-13T14:19:23.968310951Z" level=info msg="CreateContainer within sandbox \"72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 14:19:23.983865 env[1197]: time="2024-12-13T14:19:23.983802412Z" level=info msg="CreateContainer within sandbox \"72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"7f64e56bd9c8a84c2f7eeffc9154ef7f2e2c2e665be7963f4ce3ce168be3acfb\"" Dec 13 14:19:23.984467 env[1197]: time="2024-12-13T14:19:23.984432101Z" level=info msg="StartContainer for \"7f64e56bd9c8a84c2f7eeffc9154ef7f2e2c2e665be7963f4ce3ce168be3acfb\"" Dec 13 14:19:24.003563 systemd[1]: Started cri-containerd-7f64e56bd9c8a84c2f7eeffc9154ef7f2e2c2e665be7963f4ce3ce168be3acfb.scope. Dec 13 14:19:24.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.012000 audit: BPF prog-id=105 op=LOAD Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2506 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:24.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766363465353662643963386138346332663765656666633931353465 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2506 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:24.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766363465353662643963386138346332663765656666633931353465 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit: BPF prog-id=106 op=LOAD Dec 13 14:19:24.013000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a6630 items=0 ppid=2506 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:24.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766363465353662643963386138346332663765656666633931353465 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit: BPF prog-id=107 op=LOAD Dec 13 14:19:24.013000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a6678 items=0 ppid=2506 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:24.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766363465353662643963386138346332663765656666633931353465 Dec 13 14:19:24.013000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:19:24.013000 audit: BPF prog-id=106 op=UNLOAD Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { perfmon } for pid=2593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit[2593]: AVC avc: denied { bpf } for pid=2593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:24.013000 audit: BPF prog-id=108 op=LOAD Dec 13 14:19:24.013000 audit[2593]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a6a88 items=0 ppid=2506 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:24.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766363465353662643963386138346332663765656666633931353465 Dec 13 14:19:24.025735 env[1197]: time="2024-12-13T14:19:24.025670020Z" level=info msg="StartContainer for \"7f64e56bd9c8a84c2f7eeffc9154ef7f2e2c2e665be7963f4ce3ce168be3acfb\" returns successfully" Dec 13 14:19:24.193210 kubelet[1451]: I1213 14:19:24.193129 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-5md2d" podStartSLOduration=15.601910632 podStartE2EDuration="22.193108503s" podCreationTimestamp="2024-12-13 14:19:02 +0000 UTC" firstStartedPulling="2024-12-13 14:19:17.375446673 +0000 UTC m=+34.461410558" lastFinishedPulling="2024-12-13 14:19:23.966644533 +0000 UTC m=+41.052608429" observedRunningTime="2024-12-13 14:19:24.192967306 +0000 UTC m=+41.278931181" watchObservedRunningTime="2024-12-13 14:19:24.193108503 +0000 UTC m=+41.279072398" Dec 13 14:19:24.432000 audit[2650]: NETFILTER_CFG table=filter:83 family=2 entries=9 op=nft_register_rule pid=2650 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:24.433797 kernel: kauditd_printk_skb: 90 callbacks suppressed Dec 13 14:19:24.433860 kernel: audit: type=1325 audit(1734099564.432:696): table=filter:83 family=2 entries=9 op=nft_register_rule pid=2650 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:24.432000 audit[2650]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd345be2e0 a2=0 a3=7ffd345be2cc items=0 ppid=1667 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:24.441637 kernel: audit: type=1300 audit(1734099564.432:696): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd345be2e0 a2=0 a3=7ffd345be2cc items=0 ppid=1667 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:24.441694 kernel: audit: type=1327 audit(1734099564.432:696): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:24.432000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:24.445000 audit[2650]: NETFILTER_CFG table=nat:84 family=2 entries=27 op=nft_register_chain pid=2650 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:24.449429 kernel: audit: type=1325 audit(1734099564.445:697): table=nat:84 family=2 entries=27 op=nft_register_chain pid=2650 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:24.449482 kernel: audit: type=1300 audit(1734099564.445:697): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd345be2e0 a2=0 a3=7ffd345be2cc items=0 ppid=1667 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:24.445000 audit[2650]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd345be2e0 a2=0 a3=7ffd345be2cc items=0 ppid=1667 pid=2650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:24.445000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:24.457616 kernel: audit: type=1327 audit(1734099564.445:697): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:24.512551 kubelet[1451]: E1213 14:19:24.512448 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:25.513626 kubelet[1451]: E1213 14:19:25.513570 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:25.923297 env[1197]: time="2024-12-13T14:19:25.923130636Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:25.926306 env[1197]: time="2024-12-13T14:19:25.926253238Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:25.928798 env[1197]: time="2024-12-13T14:19:25.928770267Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:25.930465 env[1197]: time="2024-12-13T14:19:25.930431811Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:25.931015 env[1197]: time="2024-12-13T14:19:25.930973103Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:19:25.932997 env[1197]: time="2024-12-13T14:19:25.932974038Z" level=info msg="CreateContainer within sandbox \"af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:19:25.952148 env[1197]: time="2024-12-13T14:19:25.952073273Z" level=info msg="CreateContainer within sandbox \"af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"f2164b4facee51c9d38f49aa8020677699a1d9fa1bd075e3446116d0cd7f9068\"" Dec 13 14:19:25.952788 env[1197]: time="2024-12-13T14:19:25.952756171Z" level=info msg="StartContainer for \"f2164b4facee51c9d38f49aa8020677699a1d9fa1bd075e3446116d0cd7f9068\"" Dec 13 14:19:25.976433 systemd[1]: Started cri-containerd-f2164b4facee51c9d38f49aa8020677699a1d9fa1bd075e3446116d0cd7f9068.scope. Dec 13 14:19:25.988000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.988000 audit[2659]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f27a44bbcc8 items=0 ppid=2399 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:25.997841 kernel: audit: type=1400 audit(1734099565.988:698): avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.998056 kernel: audit: type=1300 audit(1734099565.988:698): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f27a44bbcc8 items=0 ppid=2399 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:25.998082 kernel: audit: type=1327 audit(1734099565.988:698): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632313634623466616365653531633964333866343961613830323036 Dec 13 14:19:25.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632313634623466616365653531633964333866343961613830323036 Dec 13 14:19:26.001929 kernel: audit: type=1400 audit(1734099565.988:699): avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.988000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.988000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.988000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.988000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.988000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.988000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.988000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.988000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.988000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.988000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.988000 audit: BPF prog-id=109 op=LOAD Dec 13 14:19:25.988000 audit[2659]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00034a528 items=0 ppid=2399 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:25.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632313634623466616365653531633964333866343961613830323036 Dec 13 14:19:25.992000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.992000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.992000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.992000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.992000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.992000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.992000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.992000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.992000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:25.992000 audit: BPF prog-id=110 op=LOAD Dec 13 14:19:25.992000 audit[2659]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00034a578 items=0 ppid=2399 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:25.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632313634623466616365653531633964333866343961613830323036 Dec 13 14:19:26.001000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:19:26.001000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:19:26.001000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:26.001000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:26.001000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:26.001000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:26.001000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:26.001000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:26.001000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:26.001000 audit[2659]: AVC avc: denied { perfmon } for pid=2659 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:26.001000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:26.001000 audit[2659]: AVC avc: denied { bpf } for pid=2659 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:26.001000 audit: BPF prog-id=111 op=LOAD Dec 13 14:19:26.001000 audit[2659]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00034a608 items=0 ppid=2399 pid=2659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:26.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632313634623466616365653531633964333866343961613830323036 Dec 13 14:19:26.021455 env[1197]: time="2024-12-13T14:19:26.021372305Z" level=info msg="StartContainer for \"f2164b4facee51c9d38f49aa8020677699a1d9fa1bd075e3446116d0cd7f9068\" returns successfully" Dec 13 14:19:26.066634 kubelet[1451]: I1213 14:19:26.066594 1451 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:19:26.066634 kubelet[1451]: I1213 14:19:26.066632 1451 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:19:26.514234 kubelet[1451]: E1213 14:19:26.514155 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:27.514959 kubelet[1451]: E1213 14:19:27.514876 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:28.515978 kubelet[1451]: E1213 14:19:28.515910 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:29.516220 kubelet[1451]: E1213 14:19:29.516084 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:29.981324 kubelet[1451]: E1213 14:19:29.981272 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:19:30.003556 kubelet[1451]: I1213 14:19:30.003469 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-bzpg8" podStartSLOduration=37.890131062 podStartE2EDuration="47.00344749s" podCreationTimestamp="2024-12-13 14:18:43 +0000 UTC" firstStartedPulling="2024-12-13 14:19:16.818471322 +0000 UTC m=+33.904435197" lastFinishedPulling="2024-12-13 14:19:25.93178774 +0000 UTC m=+43.017751625" observedRunningTime="2024-12-13 14:19:26.203661081 +0000 UTC m=+43.289624966" watchObservedRunningTime="2024-12-13 14:19:30.00344749 +0000 UTC m=+47.089411375" Dec 13 14:19:30.517269 kubelet[1451]: E1213 14:19:30.517197 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:30.634000 audit[2714]: NETFILTER_CFG table=filter:85 family=2 entries=20 op=nft_register_rule pid=2714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:30.635661 kernel: kauditd_printk_skb: 39 callbacks suppressed Dec 13 14:19:30.635718 kernel: audit: type=1325 audit(1734099570.634:704): table=filter:85 family=2 entries=20 op=nft_register_rule pid=2714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:30.634000 audit[2714]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcbd3b4380 a2=0 a3=7ffcbd3b436c items=0 ppid=1667 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:30.643377 kernel: audit: type=1300 audit(1734099570.634:704): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcbd3b4380 a2=0 a3=7ffcbd3b436c items=0 ppid=1667 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:30.643439 kernel: audit: type=1327 audit(1734099570.634:704): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:30.634000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:30.651000 audit[2714]: NETFILTER_CFG table=nat:86 family=2 entries=22 op=nft_register_rule pid=2714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:30.651000 audit[2714]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcbd3b4380 a2=0 a3=0 items=0 ppid=1667 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:30.659968 kernel: audit: type=1325 audit(1734099570.651:705): table=nat:86 family=2 entries=22 op=nft_register_rule pid=2714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:30.660037 kernel: audit: type=1300 audit(1734099570.651:705): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcbd3b4380 a2=0 a3=0 items=0 ppid=1667 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:30.660074 kernel: audit: type=1327 audit(1734099570.651:705): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:30.651000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:30.669000 audit[2716]: NETFILTER_CFG table=filter:87 family=2 entries=32 op=nft_register_rule pid=2716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:30.669000 audit[2716]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdfa284190 a2=0 a3=7ffdfa28417c items=0 ppid=1667 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:30.677736 kernel: audit: type=1325 audit(1734099570.669:706): table=filter:87 family=2 entries=32 op=nft_register_rule pid=2716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:30.677781 kernel: audit: type=1300 audit(1734099570.669:706): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdfa284190 a2=0 a3=7ffdfa28417c items=0 ppid=1667 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:30.677802 kernel: audit: type=1327 audit(1734099570.669:706): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:30.669000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:30.681000 audit[2716]: NETFILTER_CFG table=nat:88 family=2 entries=22 op=nft_register_rule pid=2716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:30.681000 audit[2716]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdfa284190 a2=0 a3=0 items=0 ppid=1667 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:30.681000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:30.685438 kernel: audit: type=1325 audit(1734099570.681:707): table=nat:88 family=2 entries=22 op=nft_register_rule pid=2716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:30.688996 kubelet[1451]: I1213 14:19:30.688953 1451 topology_manager.go:215] "Topology Admit Handler" podUID="51787d10-5763-403a-911a-9ac4a7177172" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 14:19:30.693346 systemd[1]: Created slice kubepods-besteffort-pod51787d10_5763_403a_911a_9ac4a7177172.slice. Dec 13 14:19:30.697824 kubelet[1451]: I1213 14:19:30.697794 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/51787d10-5763-403a-911a-9ac4a7177172-data\") pod \"nfs-server-provisioner-0\" (UID: \"51787d10-5763-403a-911a-9ac4a7177172\") " pod="default/nfs-server-provisioner-0" Dec 13 14:19:30.697883 kubelet[1451]: I1213 14:19:30.697825 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zhdt5\" (UniqueName: \"kubernetes.io/projected/51787d10-5763-403a-911a-9ac4a7177172-kube-api-access-zhdt5\") pod \"nfs-server-provisioner-0\" (UID: \"51787d10-5763-403a-911a-9ac4a7177172\") " pod="default/nfs-server-provisioner-0" Dec 13 14:19:30.996366 env[1197]: time="2024-12-13T14:19:30.996303449Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:51787d10-5763-403a-911a-9ac4a7177172,Namespace:default,Attempt:0,}" Dec 13 14:19:31.120537 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:19:31.121317 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 14:19:31.120761 systemd-networkd[1031]: cali60e51b789ff: Link UP Dec 13 14:19:31.120986 systemd-networkd[1031]: cali60e51b789ff: Gained carrier Dec 13 14:19:31.131610 env[1197]: 2024-12-13 14:19:31.046 [INFO][2718] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.25-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 51787d10-5763-403a-911a-9ac4a7177172 1162 0 2024-12-13 14:19:30 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.25 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.25-k8s-nfs--server--provisioner--0-" Dec 13 14:19:31.131610 env[1197]: 2024-12-13 14:19:31.046 [INFO][2718] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.25-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:19:31.131610 env[1197]: 2024-12-13 14:19:31.077 [INFO][2732] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462" HandleID="k8s-pod-network.41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462" Workload="10.0.0.25-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:19:31.131610 env[1197]: 2024-12-13 14:19:31.087 [INFO][2732] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462" HandleID="k8s-pod-network.41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462" Workload="10.0.0.25-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000295620), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.25", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 14:19:31.077429276 +0000 UTC"}, Hostname:"10.0.0.25", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:19:31.131610 env[1197]: 2024-12-13 14:19:31.087 [INFO][2732] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:19:31.131610 env[1197]: 2024-12-13 14:19:31.087 [INFO][2732] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:19:31.131610 env[1197]: 2024-12-13 14:19:31.087 [INFO][2732] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.25' Dec 13 14:19:31.131610 env[1197]: 2024-12-13 14:19:31.089 [INFO][2732] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462" host="10.0.0.25" Dec 13 14:19:31.131610 env[1197]: 2024-12-13 14:19:31.094 [INFO][2732] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.25" Dec 13 14:19:31.131610 env[1197]: 2024-12-13 14:19:31.098 [INFO][2732] ipam/ipam.go 489: Trying affinity for 192.168.34.0/26 host="10.0.0.25" Dec 13 14:19:31.131610 env[1197]: 2024-12-13 14:19:31.100 [INFO][2732] ipam/ipam.go 155: Attempting to load block cidr=192.168.34.0/26 host="10.0.0.25" Dec 13 14:19:31.131610 env[1197]: 2024-12-13 14:19:31.102 [INFO][2732] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.0/26 host="10.0.0.25" Dec 13 14:19:31.131610 env[1197]: 2024-12-13 14:19:31.102 [INFO][2732] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.0/26 handle="k8s-pod-network.41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462" host="10.0.0.25" Dec 13 14:19:31.131610 env[1197]: 2024-12-13 14:19:31.104 [INFO][2732] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462 Dec 13 14:19:31.131610 env[1197]: 2024-12-13 14:19:31.109 [INFO][2732] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.34.0/26 handle="k8s-pod-network.41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462" host="10.0.0.25" Dec 13 14:19:31.131610 env[1197]: 2024-12-13 14:19:31.114 [INFO][2732] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.34.3/26] block=192.168.34.0/26 handle="k8s-pod-network.41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462" host="10.0.0.25" Dec 13 14:19:31.131610 env[1197]: 2024-12-13 14:19:31.114 [INFO][2732] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.3/26] handle="k8s-pod-network.41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462" host="10.0.0.25" Dec 13 14:19:31.131610 env[1197]: 2024-12-13 14:19:31.114 [INFO][2732] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:19:31.131610 env[1197]: 2024-12-13 14:19:31.114 [INFO][2732] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.3/26] IPv6=[] ContainerID="41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462" HandleID="k8s-pod-network.41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462" Workload="10.0.0.25-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:19:31.132300 env[1197]: 2024-12-13 14:19:31.115 [INFO][2718] cni-plugin/k8s.go 386: Populated endpoint ContainerID="41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.25-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.25-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"51787d10-5763-403a-911a-9ac4a7177172", ResourceVersion:"1162", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 19, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.25", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.34.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:19:31.132300 env[1197]: 2024-12-13 14:19:31.116 [INFO][2718] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.34.3/32] ContainerID="41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.25-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:19:31.132300 env[1197]: 2024-12-13 14:19:31.116 [INFO][2718] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.25-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:19:31.132300 env[1197]: 2024-12-13 14:19:31.120 [INFO][2718] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.25-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:19:31.132467 env[1197]: 2024-12-13 14:19:31.120 [INFO][2718] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.25-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.25-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"51787d10-5763-403a-911a-9ac4a7177172", ResourceVersion:"1162", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 19, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.25", ContainerID:"41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.34.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"62:44:7a:3c:9a:26", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:19:31.132467 env[1197]: 2024-12-13 14:19:31.129 [INFO][2718] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.25-k8s-nfs--server--provisioner--0-eth0" Dec 13 14:19:31.141000 audit[2755]: NETFILTER_CFG table=filter:89 family=2 entries=38 op=nft_register_chain pid=2755 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:19:31.141000 audit[2755]: SYSCALL arch=c000003e syscall=46 success=yes exit=19820 a0=3 a1=7ffcbd244270 a2=0 a3=7ffcbd24425c items=0 ppid=2128 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:31.141000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:19:31.163707 env[1197]: time="2024-12-13T14:19:31.163600362Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:19:31.163707 env[1197]: time="2024-12-13T14:19:31.163701924Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:19:31.163925 env[1197]: time="2024-12-13T14:19:31.163734645Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:19:31.164030 env[1197]: time="2024-12-13T14:19:31.163979136Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462 pid=2763 runtime=io.containerd.runc.v2 Dec 13 14:19:31.179229 systemd[1]: run-containerd-runc-k8s.io-41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462-runc.bJ64FH.mount: Deactivated successfully. Dec 13 14:19:31.182828 systemd[1]: Started cri-containerd-41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462.scope. Dec 13 14:19:31.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.194000 audit: BPF prog-id=112 op=LOAD Dec 13 14:19:31.194000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.194000 audit[2773]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2763 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:31.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431616364623533363634323662326535653234633639303666393462 Dec 13 14:19:31.194000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.194000 audit[2773]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2763 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:31.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431616364623533363634323662326535653234633639303666393462 Dec 13 14:19:31.194000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.194000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.194000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.194000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.194000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.194000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.194000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.194000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.194000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.194000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.194000 audit: BPF prog-id=113 op=LOAD Dec 13 14:19:31.194000 audit[2773]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0003ea000 items=0 ppid=2763 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:31.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431616364623533363634323662326535653234633639303666393462 Dec 13 14:19:31.195000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.195000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.195000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.195000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.195000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.195000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.195000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.195000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.195000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.195000 audit: BPF prog-id=114 op=LOAD Dec 13 14:19:31.195000 audit[2773]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0003ea048 items=0 ppid=2763 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:31.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431616364623533363634323662326535653234633639303666393462 Dec 13 14:19:31.195000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:19:31.195000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:19:31.195000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.195000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.195000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.195000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.195000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.195000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.195000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.195000 audit[2773]: AVC avc: denied { perfmon } for pid=2773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.195000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.195000 audit[2773]: AVC avc: denied { bpf } for pid=2773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:31.195000 audit: BPF prog-id=115 op=LOAD Dec 13 14:19:31.195000 audit[2773]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0003ea458 items=0 ppid=2763 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:31.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431616364623533363634323662326535653234633639303666393462 Dec 13 14:19:31.197061 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:19:31.223983 env[1197]: time="2024-12-13T14:19:31.223908185Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:51787d10-5763-403a-911a-9ac4a7177172,Namespace:default,Attempt:0,} returns sandbox id \"41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462\"" Dec 13 14:19:31.226095 env[1197]: time="2024-12-13T14:19:31.226044859Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 14:19:31.517483 kubelet[1451]: E1213 14:19:31.517387 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:32.517826 kubelet[1451]: E1213 14:19:32.517763 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:32.915434 kubelet[1451]: I1213 14:19:32.915268 1451 topology_manager.go:215] "Topology Admit Handler" podUID="9730f181-08ab-4685-a870-70a33f65d362" podNamespace="calico-system" podName="calico-typha-9b8dcb4b4-tprm8" Dec 13 14:19:32.920908 systemd[1]: Created slice kubepods-besteffort-pod9730f181_08ab_4685_a870_70a33f65d362.slice. Dec 13 14:19:32.951000 audit[2798]: NETFILTER_CFG table=filter:90 family=2 entries=32 op=nft_register_rule pid=2798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:32.951000 audit[2798]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffddb1a3090 a2=0 a3=7ffddb1a307c items=0 ppid=1667 pid=2798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:32.951000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:32.958000 audit[2798]: NETFILTER_CFG table=nat:91 family=2 entries=30 op=nft_register_rule pid=2798 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:32.958000 audit[2798]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffddb1a3090 a2=0 a3=0 items=0 ppid=1667 pid=2798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:32.958000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:33.008972 kubelet[1451]: I1213 14:19:33.008910 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9730f181-08ab-4685-a870-70a33f65d362-tigera-ca-bundle\") pod \"calico-typha-9b8dcb4b4-tprm8\" (UID: \"9730f181-08ab-4685-a870-70a33f65d362\") " pod="calico-system/calico-typha-9b8dcb4b4-tprm8" Dec 13 14:19:33.008972 kubelet[1451]: I1213 14:19:33.008966 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-857np\" (UniqueName: \"kubernetes.io/projected/9730f181-08ab-4685-a870-70a33f65d362-kube-api-access-857np\") pod \"calico-typha-9b8dcb4b4-tprm8\" (UID: \"9730f181-08ab-4685-a870-70a33f65d362\") " pod="calico-system/calico-typha-9b8dcb4b4-tprm8" Dec 13 14:19:33.009221 kubelet[1451]: I1213 14:19:33.008993 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/9730f181-08ab-4685-a870-70a33f65d362-typha-certs\") pod \"calico-typha-9b8dcb4b4-tprm8\" (UID: \"9730f181-08ab-4685-a870-70a33f65d362\") " pod="calico-system/calico-typha-9b8dcb4b4-tprm8" Dec 13 14:19:33.029632 systemd-networkd[1031]: cali60e51b789ff: Gained IPv6LL Dec 13 14:19:33.223696 kubelet[1451]: E1213 14:19:33.223667 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:19:33.224088 env[1197]: time="2024-12-13T14:19:33.224053824Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-9b8dcb4b4-tprm8,Uid:9730f181-08ab-4685-a870-70a33f65d362,Namespace:calico-system,Attempt:0,}" Dec 13 14:19:33.245244 env[1197]: time="2024-12-13T14:19:33.245173544Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:19:33.245244 env[1197]: time="2024-12-13T14:19:33.245215543Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:19:33.245517 env[1197]: time="2024-12-13T14:19:33.245460604Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:19:33.245719 env[1197]: time="2024-12-13T14:19:33.245685227Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/180fac44f3ffc92b4b3ddf7764d5726ed6897557acfe324136d328fd5c6f6217 pid=2808 runtime=io.containerd.runc.v2 Dec 13 14:19:33.262702 systemd[1]: Started cri-containerd-180fac44f3ffc92b4b3ddf7764d5726ed6897557acfe324136d328fd5c6f6217.scope. Dec 13 14:19:33.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit: BPF prog-id=116 op=LOAD Dec 13 14:19:33.279000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2808 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:33.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138306661633434663366666339326234623364646637373634643537 Dec 13 14:19:33.279000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2808 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:33.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138306661633434663366666339326234623364646637373634643537 Dec 13 14:19:33.279000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.279000 audit: BPF prog-id=117 op=LOAD Dec 13 14:19:33.279000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c6380 items=0 ppid=2808 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:33.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138306661633434663366666339326234623364646637373634643537 Dec 13 14:19:33.280000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.280000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.280000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.280000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.280000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.280000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.280000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.280000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.280000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.280000 audit: BPF prog-id=118 op=LOAD Dec 13 14:19:33.280000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003c63c8 items=0 ppid=2808 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:33.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138306661633434663366666339326234623364646637373634643537 Dec 13 14:19:33.280000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:19:33.280000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:19:33.280000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.280000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.280000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.280000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.280000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.280000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.280000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.280000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.280000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.280000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:33.280000 audit: BPF prog-id=119 op=LOAD Dec 13 14:19:33.280000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c67d8 items=0 ppid=2808 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:33.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138306661633434663366666339326234623364646637373634643537 Dec 13 14:19:33.317471 env[1197]: time="2024-12-13T14:19:33.317415793Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-9b8dcb4b4-tprm8,Uid:9730f181-08ab-4685-a870-70a33f65d362,Namespace:calico-system,Attempt:0,} returns sandbox id \"180fac44f3ffc92b4b3ddf7764d5726ed6897557acfe324136d328fd5c6f6217\"" Dec 13 14:19:33.318418 kubelet[1451]: E1213 14:19:33.318371 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:19:33.475443 kubelet[1451]: I1213 14:19:33.475261 1451 topology_manager.go:215] "Topology Admit Handler" podUID="9e8c5134-c501-4ec4-a608-265d270f5ecc" podNamespace="calico-system" podName="calico-kube-controllers-b796d77-drp9f" Dec 13 14:19:33.481674 systemd[1]: Created slice kubepods-besteffort-pod9e8c5134_c501_4ec4_a608_265d270f5ecc.slice. Dec 13 14:19:33.518599 kubelet[1451]: E1213 14:19:33.518556 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:33.613021 kubelet[1451]: I1213 14:19:33.612951 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m5n9k\" (UniqueName: \"kubernetes.io/projected/9e8c5134-c501-4ec4-a608-265d270f5ecc-kube-api-access-m5n9k\") pod \"calico-kube-controllers-b796d77-drp9f\" (UID: \"9e8c5134-c501-4ec4-a608-265d270f5ecc\") " pod="calico-system/calico-kube-controllers-b796d77-drp9f" Dec 13 14:19:33.613021 kubelet[1451]: I1213 14:19:33.613019 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9e8c5134-c501-4ec4-a608-265d270f5ecc-tigera-ca-bundle\") pod \"calico-kube-controllers-b796d77-drp9f\" (UID: \"9e8c5134-c501-4ec4-a608-265d270f5ecc\") " pod="calico-system/calico-kube-controllers-b796d77-drp9f" Dec 13 14:19:33.785423 env[1197]: time="2024-12-13T14:19:33.785257111Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b796d77-drp9f,Uid:9e8c5134-c501-4ec4-a608-265d270f5ecc,Namespace:calico-system,Attempt:0,}" Dec 13 14:19:33.860407 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4120826771.mount: Deactivated successfully. Dec 13 14:19:33.966743 systemd-networkd[1031]: cali03d532dce35: Link UP Dec 13 14:19:33.970176 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:19:33.970334 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali03d532dce35: link becomes ready Dec 13 14:19:33.970125 systemd-networkd[1031]: cali03d532dce35: Gained carrier Dec 13 14:19:33.988201 env[1197]: 2024-12-13 14:19:33.870 [INFO][2843] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.25-k8s-calico--kube--controllers--b796d77--drp9f-eth0 calico-kube-controllers-b796d77- calico-system 9e8c5134-c501-4ec4-a608-265d270f5ecc 1264 0 2024-12-13 14:19:33 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:b796d77 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s 10.0.0.25 calico-kube-controllers-b796d77-drp9f eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali03d532dce35 [] []}} ContainerID="a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a" Namespace="calico-system" Pod="calico-kube-controllers-b796d77-drp9f" WorkloadEndpoint="10.0.0.25-k8s-calico--kube--controllers--b796d77--drp9f-" Dec 13 14:19:33.988201 env[1197]: 2024-12-13 14:19:33.874 [INFO][2843] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a" Namespace="calico-system" Pod="calico-kube-controllers-b796d77-drp9f" WorkloadEndpoint="10.0.0.25-k8s-calico--kube--controllers--b796d77--drp9f-eth0" Dec 13 14:19:33.988201 env[1197]: 2024-12-13 14:19:33.907 [INFO][2858] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a" HandleID="k8s-pod-network.a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a" Workload="10.0.0.25-k8s-calico--kube--controllers--b796d77--drp9f-eth0" Dec 13 14:19:33.988201 env[1197]: 2024-12-13 14:19:33.915 [INFO][2858] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a" HandleID="k8s-pod-network.a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a" Workload="10.0.0.25-k8s-calico--kube--controllers--b796d77--drp9f-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000405f70), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.25", "pod":"calico-kube-controllers-b796d77-drp9f", "timestamp":"2024-12-13 14:19:33.907512031 +0000 UTC"}, Hostname:"10.0.0.25", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:19:33.988201 env[1197]: 2024-12-13 14:19:33.916 [INFO][2858] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:19:33.988201 env[1197]: 2024-12-13 14:19:33.916 [INFO][2858] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:19:33.988201 env[1197]: 2024-12-13 14:19:33.916 [INFO][2858] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.25' Dec 13 14:19:33.988201 env[1197]: 2024-12-13 14:19:33.918 [INFO][2858] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a" host="10.0.0.25" Dec 13 14:19:33.988201 env[1197]: 2024-12-13 14:19:33.922 [INFO][2858] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.25" Dec 13 14:19:33.988201 env[1197]: 2024-12-13 14:19:33.927 [INFO][2858] ipam/ipam.go 489: Trying affinity for 192.168.34.0/26 host="10.0.0.25" Dec 13 14:19:33.988201 env[1197]: 2024-12-13 14:19:33.929 [INFO][2858] ipam/ipam.go 155: Attempting to load block cidr=192.168.34.0/26 host="10.0.0.25" Dec 13 14:19:33.988201 env[1197]: 2024-12-13 14:19:33.933 [INFO][2858] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.0/26 host="10.0.0.25" Dec 13 14:19:33.988201 env[1197]: 2024-12-13 14:19:33.933 [INFO][2858] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.0/26 handle="k8s-pod-network.a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a" host="10.0.0.25" Dec 13 14:19:33.988201 env[1197]: 2024-12-13 14:19:33.936 [INFO][2858] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a Dec 13 14:19:33.988201 env[1197]: 2024-12-13 14:19:33.950 [INFO][2858] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.34.0/26 handle="k8s-pod-network.a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a" host="10.0.0.25" Dec 13 14:19:33.988201 env[1197]: 2024-12-13 14:19:33.963 [INFO][2858] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.34.4/26] block=192.168.34.0/26 handle="k8s-pod-network.a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a" host="10.0.0.25" Dec 13 14:19:33.988201 env[1197]: 2024-12-13 14:19:33.963 [INFO][2858] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.4/26] handle="k8s-pod-network.a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a" host="10.0.0.25" Dec 13 14:19:33.988201 env[1197]: 2024-12-13 14:19:33.963 [INFO][2858] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:19:33.988201 env[1197]: 2024-12-13 14:19:33.963 [INFO][2858] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.4/26] IPv6=[] ContainerID="a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a" HandleID="k8s-pod-network.a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a" Workload="10.0.0.25-k8s-calico--kube--controllers--b796d77--drp9f-eth0" Dec 13 14:19:33.989128 env[1197]: 2024-12-13 14:19:33.964 [INFO][2843] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a" Namespace="calico-system" Pod="calico-kube-controllers-b796d77-drp9f" WorkloadEndpoint="10.0.0.25-k8s-calico--kube--controllers--b796d77--drp9f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.25-k8s-calico--kube--controllers--b796d77--drp9f-eth0", GenerateName:"calico-kube-controllers-b796d77-", Namespace:"calico-system", SelfLink:"", UID:"9e8c5134-c501-4ec4-a608-265d270f5ecc", ResourceVersion:"1264", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 19, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b796d77", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.25", ContainerID:"", Pod:"calico-kube-controllers-b796d77-drp9f", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.34.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali03d532dce35", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:19:33.989128 env[1197]: 2024-12-13 14:19:33.964 [INFO][2843] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.34.4/32] ContainerID="a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a" Namespace="calico-system" Pod="calico-kube-controllers-b796d77-drp9f" WorkloadEndpoint="10.0.0.25-k8s-calico--kube--controllers--b796d77--drp9f-eth0" Dec 13 14:19:33.989128 env[1197]: 2024-12-13 14:19:33.964 [INFO][2843] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali03d532dce35 ContainerID="a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a" Namespace="calico-system" Pod="calico-kube-controllers-b796d77-drp9f" WorkloadEndpoint="10.0.0.25-k8s-calico--kube--controllers--b796d77--drp9f-eth0" Dec 13 14:19:33.989128 env[1197]: 2024-12-13 14:19:33.970 [INFO][2843] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a" Namespace="calico-system" Pod="calico-kube-controllers-b796d77-drp9f" WorkloadEndpoint="10.0.0.25-k8s-calico--kube--controllers--b796d77--drp9f-eth0" Dec 13 14:19:33.989128 env[1197]: 2024-12-13 14:19:33.971 [INFO][2843] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a" Namespace="calico-system" Pod="calico-kube-controllers-b796d77-drp9f" WorkloadEndpoint="10.0.0.25-k8s-calico--kube--controllers--b796d77--drp9f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.25-k8s-calico--kube--controllers--b796d77--drp9f-eth0", GenerateName:"calico-kube-controllers-b796d77-", Namespace:"calico-system", SelfLink:"", UID:"9e8c5134-c501-4ec4-a608-265d270f5ecc", ResourceVersion:"1264", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 19, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"b796d77", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.25", ContainerID:"a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a", Pod:"calico-kube-controllers-b796d77-drp9f", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.34.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali03d532dce35", MAC:"92:4d:81:25:71:af", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:19:33.989128 env[1197]: 2024-12-13 14:19:33.985 [INFO][2843] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a" Namespace="calico-system" Pod="calico-kube-controllers-b796d77-drp9f" WorkloadEndpoint="10.0.0.25-k8s-calico--kube--controllers--b796d77--drp9f-eth0" Dec 13 14:19:33.999000 audit[2888]: NETFILTER_CFG table=filter:92 family=2 entries=48 op=nft_register_chain pid=2888 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:19:33.999000 audit[2888]: SYSCALL arch=c000003e syscall=46 success=yes exit=23868 a0=3 a1=7ffc546bd8e0 a2=0 a3=7ffc546bd8cc items=0 ppid=2128 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:33.999000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:19:34.030171 env[1197]: time="2024-12-13T14:19:34.030083253Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:19:34.030356 env[1197]: time="2024-12-13T14:19:34.030138877Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:19:34.030356 env[1197]: time="2024-12-13T14:19:34.030152563Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:19:34.030511 env[1197]: time="2024-12-13T14:19:34.030323495Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a pid=2896 runtime=io.containerd.runc.v2 Dec 13 14:19:34.047519 systemd[1]: Started cri-containerd-a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a.scope. Dec 13 14:19:34.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit: BPF prog-id=120 op=LOAD Dec 13 14:19:34.061000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[2906]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2896 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:34.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133373139663662323831623362653636633231373464663562393066 Dec 13 14:19:34.061000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[2906]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2896 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:34.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133373139663662323831623362653636633231373464663562393066 Dec 13 14:19:34.061000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.061000 audit: BPF prog-id=121 op=LOAD Dec 13 14:19:34.061000 audit[2906]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003e8f30 items=0 ppid=2896 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:34.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133373139663662323831623362653636633231373464663562393066 Dec 13 14:19:34.062000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.062000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.062000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.062000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.062000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.062000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.062000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.062000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.062000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.062000 audit: BPF prog-id=122 op=LOAD Dec 13 14:19:34.062000 audit[2906]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003e8f78 items=0 ppid=2896 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:34.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133373139663662323831623362653636633231373464663562393066 Dec 13 14:19:34.062000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:19:34.062000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:19:34.062000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.062000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.062000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.062000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.062000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.062000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.062000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.062000 audit[2906]: AVC avc: denied { perfmon } for pid=2906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.062000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.062000 audit[2906]: AVC avc: denied { bpf } for pid=2906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:34.062000 audit: BPF prog-id=123 op=LOAD Dec 13 14:19:34.062000 audit[2906]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e9388 items=0 ppid=2896 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:34.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133373139663662323831623362653636633231373464663562393066 Dec 13 14:19:34.063318 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:19:34.095575 env[1197]: time="2024-12-13T14:19:34.095496021Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-b796d77-drp9f,Uid:9e8c5134-c501-4ec4-a608-265d270f5ecc,Namespace:calico-system,Attempt:0,} returns sandbox id \"a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a\"" Dec 13 14:19:34.519305 kubelet[1451]: E1213 14:19:34.519237 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:35.280434 systemd-networkd[1031]: cali03d532dce35: Gained IPv6LL Dec 13 14:19:35.519649 kubelet[1451]: E1213 14:19:35.519590 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:36.491000 audit[2971]: NETFILTER_CFG table=filter:93 family=2 entries=32 op=nft_register_rule pid=2971 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:36.495650 kernel: kauditd_printk_skb: 185 callbacks suppressed Dec 13 14:19:36.495734 kernel: audit: type=1325 audit(1734099576.491:766): table=filter:93 family=2 entries=32 op=nft_register_rule pid=2971 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:36.495782 kernel: audit: type=1300 audit(1734099576.491:766): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd36737260 a2=0 a3=7ffd3673724c items=0 ppid=1667 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:36.491000 audit[2971]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd36737260 a2=0 a3=7ffd3673724c items=0 ppid=1667 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:36.491000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:36.504484 env[1197]: time="2024-12-13T14:19:36.504147418Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:36.504897 kernel: audit: type=1327 audit(1734099576.491:766): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:36.507394 env[1197]: time="2024-12-13T14:19:36.507349562Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:36.511000 audit[2971]: NETFILTER_CFG table=nat:94 family=2 entries=34 op=nft_register_chain pid=2971 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:36.513110 env[1197]: time="2024-12-13T14:19:36.513035937Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:36.515565 env[1197]: time="2024-12-13T14:19:36.515495764Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:36.511000 audit[2971]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd36737260 a2=0 a3=7ffd3673724c items=0 ppid=1667 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:36.516249 env[1197]: time="2024-12-13T14:19:36.516217262Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Dec 13 14:19:36.517971 env[1197]: time="2024-12-13T14:19:36.517812282Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:19:36.519236 env[1197]: time="2024-12-13T14:19:36.519207205Z" level=info msg="CreateContainer within sandbox \"41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 14:19:36.520297 kubelet[1451]: E1213 14:19:36.520254 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:36.522111 kernel: audit: type=1325 audit(1734099576.511:767): table=nat:94 family=2 entries=34 op=nft_register_chain pid=2971 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:36.522189 kernel: audit: type=1300 audit(1734099576.511:767): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd36737260 a2=0 a3=7ffd3673724c items=0 ppid=1667 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:36.522269 kernel: audit: type=1327 audit(1734099576.511:767): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:36.511000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:36.693713 env[1197]: time="2024-12-13T14:19:36.693608583Z" level=info msg="CreateContainer within sandbox \"41acdb5366426b2e5e24c6906f94bc0a409a67a18e80b7a9e73a3b0f05220462\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"6322f875d59a48160a6872e4fc4b74d32b5c9fc20c45c12ba343f620e426057a\"" Dec 13 14:19:36.694454 env[1197]: time="2024-12-13T14:19:36.694418957Z" level=info msg="StartContainer for \"6322f875d59a48160a6872e4fc4b74d32b5c9fc20c45c12ba343f620e426057a\"" Dec 13 14:19:36.718290 systemd[1]: Started cri-containerd-6322f875d59a48160a6872e4fc4b74d32b5c9fc20c45c12ba343f620e426057a.scope. Dec 13 14:19:36.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.875583 kernel: audit: type=1400 audit(1734099576.853:768): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.875799 kernel: audit: type=1400 audit(1734099576.853:769): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.875828 kernel: audit: type=1400 audit(1734099576.853:770): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.879202 kernel: audit: type=1400 audit(1734099576.853:771): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.856000 audit: BPF prog-id=124 op=LOAD Dec 13 14:19:36.857000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.857000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2763 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:36.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633323266383735643539613438313630613638373265346663346237 Dec 13 14:19:36.857000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.857000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2763 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:36.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633323266383735643539613438313630613638373265346663346237 Dec 13 14:19:36.857000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.857000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.857000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.857000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.857000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.857000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.857000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.857000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.857000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.857000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.857000 audit: BPF prog-id=125 op=LOAD Dec 13 14:19:36.857000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00039e870 items=0 ppid=2763 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:36.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633323266383735643539613438313630613638373265346663346237 Dec 13 14:19:36.875000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.875000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.875000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.875000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.875000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.875000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.875000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.875000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.875000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.875000 audit: BPF prog-id=126 op=LOAD Dec 13 14:19:36.875000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00039e8b8 items=0 ppid=2763 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:36.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633323266383735643539613438313630613638373265346663346237 Dec 13 14:19:36.882000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:19:36.882000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:19:36.882000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.882000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.882000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.882000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.882000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.882000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.882000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.882000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.882000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.882000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:36.882000 audit: BPF prog-id=127 op=LOAD Dec 13 14:19:36.882000 audit[2981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00039ecc8 items=0 ppid=2763 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:36.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633323266383735643539613438313630613638373265346663346237 Dec 13 14:19:36.940000 audit[3010]: AVC avc: denied { search } for pid=3010 comm="rpcbind" name="crypto" dev="proc" ino=23523 scontext=system_u:system_r:svirt_lxc_net_t:s0:c457,c967 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:19:36.940000 audit[3010]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fbcdfdb70c0 a2=0 a3=0 items=0 ppid=2991 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c457,c967 key=(null) Dec 13 14:19:36.940000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 14:19:37.113382 env[1197]: time="2024-12-13T14:19:37.113229866Z" level=info msg="StartContainer for \"6322f875d59a48160a6872e4fc4b74d32b5c9fc20c45c12ba343f620e426057a\" returns successfully" Dec 13 14:19:37.249000 audit[3036]: AVC avc: denied { search } for pid=3036 comm="dbus-daemon" name="crypto" dev="proc" ino=23523 scontext=system_u:system_r:svirt_lxc_net_t:s0:c457,c967 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:19:37.249000 audit[3036]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fad373790c0 a2=0 a3=0 items=0 ppid=2991 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c457,c967 key=(null) Dec 13 14:19:37.249000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:19:37.253000 audit[3037]: AVC avc: denied { watch } for pid=3037 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538730 scontext=system_u:system_r:svirt_lxc_net_t:s0:c457,c967 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c457,c967 tclass=dir permissive=0 Dec 13 14:19:37.253000 audit[3037]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5646da77d040 a2=2c8 a3=7fff6ca4a39c items=0 ppid=2991 pid=3037 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c457,c967 key=(null) Dec 13 14:19:37.253000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 14:19:37.270000 audit[3038]: AVC avc: denied { read } for pid=3038 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23829 scontext=system_u:system_r:svirt_lxc_net_t:s0:c457,c967 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 14:19:37.270000 audit[3038]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f9ce028b320 a1=80000 a2=d a3=7ffd34ec3e30 items=0 ppid=2991 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c457,c967 key=(null) Dec 13 14:19:37.270000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:19:37.270000 audit[3038]: AVC avc: denied { search } for pid=3038 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23523 scontext=system_u:system_r:svirt_lxc_net_t:s0:c457,c967 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 14:19:37.270000 audit[3038]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f9cdf7df0c0 a2=0 a3=0 items=0 ppid=2991 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c457,c967 key=(null) Dec 13 14:19:37.270000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 14:19:37.284339 kubelet[1451]: I1213 14:19:37.284265 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.992243551 podStartE2EDuration="7.284243111s" podCreationTimestamp="2024-12-13 14:19:30 +0000 UTC" firstStartedPulling="2024-12-13 14:19:31.225562991 +0000 UTC m=+48.311526876" lastFinishedPulling="2024-12-13 14:19:36.517562521 +0000 UTC m=+53.603526436" observedRunningTime="2024-12-13 14:19:37.284145267 +0000 UTC m=+54.370109182" watchObservedRunningTime="2024-12-13 14:19:37.284243111 +0000 UTC m=+54.370206996" Dec 13 14:19:37.521361 kubelet[1451]: E1213 14:19:37.521291 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:37.540000 audit[3043]: NETFILTER_CFG table=filter:95 family=2 entries=20 op=nft_register_rule pid=3043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:37.540000 audit[3043]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff0bf1cea0 a2=0 a3=7fff0bf1ce8c items=0 ppid=1667 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:37.540000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:37.544000 audit[3043]: NETFILTER_CFG table=nat:96 family=2 entries=106 op=nft_register_chain pid=3043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:37.544000 audit[3043]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff0bf1cea0 a2=0 a3=7fff0bf1ce8c items=0 ppid=1667 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:37.544000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:38.077000 audit[3061]: NETFILTER_CFG table=filter:97 family=2 entries=9 op=nft_register_rule pid=3061 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:38.077000 audit[3061]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffec76f3ae0 a2=0 a3=7ffec76f3acc items=0 ppid=1667 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:38.077000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:38.086000 audit[3061]: NETFILTER_CFG table=nat:98 family=2 entries=51 op=nft_unregister_chain pid=3061 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:38.086000 audit[3061]: SYSCALL arch=c000003e syscall=46 success=yes exit=15244 a0=3 a1=7ffec76f3ae0 a2=0 a3=7ffec76f3acc items=0 ppid=1667 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:38.086000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:38.522384 kubelet[1451]: E1213 14:19:38.522252 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:39.523209 kubelet[1451]: E1213 14:19:39.523100 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:39.693249 env[1197]: time="2024-12-13T14:19:39.693124602Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:39.696114 env[1197]: time="2024-12-13T14:19:39.696047797Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:39.698375 env[1197]: time="2024-12-13T14:19:39.698334196Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:39.700704 env[1197]: time="2024-12-13T14:19:39.700650310Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:39.701362 env[1197]: time="2024-12-13T14:19:39.701317554Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:19:39.703115 env[1197]: time="2024-12-13T14:19:39.703069378Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:19:39.715561 env[1197]: time="2024-12-13T14:19:39.715494827Z" level=info msg="CreateContainer within sandbox \"180fac44f3ffc92b4b3ddf7764d5726ed6897557acfe324136d328fd5c6f6217\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:19:39.735031 env[1197]: time="2024-12-13T14:19:39.734964448Z" level=info msg="CreateContainer within sandbox \"180fac44f3ffc92b4b3ddf7764d5726ed6897557acfe324136d328fd5c6f6217\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"61f674a851450e983eca91a5293f062955f17336938397b8f23356824e644a15\"" Dec 13 14:19:39.735792 env[1197]: time="2024-12-13T14:19:39.735750987Z" level=info msg="StartContainer for \"61f674a851450e983eca91a5293f062955f17336938397b8f23356824e644a15\"" Dec 13 14:19:39.752841 systemd[1]: Started cri-containerd-61f674a851450e983eca91a5293f062955f17336938397b8f23356824e644a15.scope. Dec 13 14:19:39.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.768000 audit: BPF prog-id=128 op=LOAD Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2808 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:39.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631663637346138353134353065393833656361393161353239336630 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2808 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:39.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631663637346138353134353065393833656361393161353239336630 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit: BPF prog-id=129 op=LOAD Dec 13 14:19:39.769000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000324190 items=0 ppid=2808 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:39.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631663637346138353134353065393833656361393161353239336630 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit: BPF prog-id=130 op=LOAD Dec 13 14:19:39.769000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003241d8 items=0 ppid=2808 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:39.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631663637346138353134353065393833656361393161353239336630 Dec 13 14:19:39.769000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:19:39.769000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:39.769000 audit: BPF prog-id=131 op=LOAD Dec 13 14:19:39.769000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003245e8 items=0 ppid=2808 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:39.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631663637346138353134353065393833656361393161353239336630 Dec 13 14:19:39.874458 env[1197]: time="2024-12-13T14:19:39.874242284Z" level=info msg="StartContainer for \"61f674a851450e983eca91a5293f062955f17336938397b8f23356824e644a15\" returns successfully" Dec 13 14:19:40.234080 kubelet[1451]: E1213 14:19:40.234037 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:19:40.298068 kubelet[1451]: I1213 14:19:40.297935 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-9b8dcb4b4-tprm8" podStartSLOduration=1.914161308 podStartE2EDuration="8.297903645s" podCreationTimestamp="2024-12-13 14:19:32 +0000 UTC" firstStartedPulling="2024-12-13 14:19:33.31899189 +0000 UTC m=+50.404955775" lastFinishedPulling="2024-12-13 14:19:39.702734227 +0000 UTC m=+56.788698112" observedRunningTime="2024-12-13 14:19:40.297484989 +0000 UTC m=+57.383448874" watchObservedRunningTime="2024-12-13 14:19:40.297903645 +0000 UTC m=+57.383867540" Dec 13 14:19:40.511000 audit[3180]: NETFILTER_CFG table=filter:99 family=2 entries=9 op=nft_register_rule pid=3180 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:40.511000 audit[3180]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd1e6b5880 a2=0 a3=7ffd1e6b586c items=0 ppid=1667 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:40.511000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:40.521000 audit[3180]: NETFILTER_CFG table=nat:100 family=2 entries=51 op=nft_register_chain pid=3180 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:19:40.521000 audit[3180]: SYSCALL arch=c000003e syscall=46 success=yes exit=18564 a0=3 a1=7ffd1e6b5880 a2=0 a3=7ffd1e6b586c items=0 ppid=1667 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:40.521000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:19:40.523716 kubelet[1451]: E1213 14:19:40.523663 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:41.184000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.184000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.184000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.184000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.184000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.184000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.184000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.184000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.184000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.184000 audit: BPF prog-id=132 op=LOAD Dec 13 14:19:41.184000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcf7f5a7e0 a2=98 a3=3 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.184000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.184000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:19:41.184000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.184000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.184000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.184000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.184000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.184000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.184000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.184000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.184000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.184000 audit: BPF prog-id=133 op=LOAD Dec 13 14:19:41.184000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcf7f5a5c0 a2=74 a3=540051 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.184000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.185000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:19:41.185000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.185000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.185000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.185000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.185000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.185000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.185000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.185000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.185000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.185000 audit: BPF prog-id=134 op=LOAD Dec 13 14:19:41.185000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcf7f5a5f0 a2=94 a3=2 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.185000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.185000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:19:41.236749 kubelet[1451]: E1213 14:19:41.236702 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:19:41.302000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.302000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.302000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.302000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.302000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.302000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.302000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.302000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.302000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.302000 audit: BPF prog-id=135 op=LOAD Dec 13 14:19:41.302000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcf7f5a4b0 a2=40 a3=1 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.302000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.302000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:19:41.302000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.302000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcf7f5a580 a2=50 a3=7ffcf7f5a660 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.302000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.310000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.310000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf7f5a4c0 a2=28 a3=0 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.310000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.310000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.310000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf7f5a4f0 a2=28 a3=0 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.310000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.310000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.310000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf7f5a400 a2=28 a3=0 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.310000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.310000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.310000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf7f5a510 a2=28 a3=0 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.310000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.310000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.310000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf7f5a4f0 a2=28 a3=0 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.310000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.310000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.310000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf7f5a4e0 a2=28 a3=0 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.310000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.310000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.310000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf7f5a510 a2=28 a3=0 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.310000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.310000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.310000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf7f5a4f0 a2=28 a3=0 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.310000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.310000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.310000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf7f5a510 a2=28 a3=0 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.310000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.310000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.310000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcf7f5a4e0 a2=28 a3=0 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.310000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.310000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.310000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcf7f5a550 a2=28 a3=0 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.310000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcf7f5a300 a2=50 a3=1 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.311000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit: BPF prog-id=136 op=LOAD Dec 13 14:19:41.311000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcf7f5a300 a2=94 a3=5 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.311000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.311000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcf7f5a3b0 a2=50 a3=1 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.311000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcf7f5a4d0 a2=4 a3=38 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.311000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { confidentiality } for pid=3196 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:41.311000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcf7f5a520 a2=94 a3=6 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.311000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { confidentiality } for pid=3196 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:41.311000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcf7f59cd0 a2=94 a3=83 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.311000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.311000 audit[3196]: AVC avc: denied { confidentiality } for pid=3196 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:41.311000 audit[3196]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcf7f59cd0 a2=94 a3=83 items=0 ppid=3181 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.311000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:19:41.312000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.312000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.312000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.312000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.312000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.312000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.312000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.312000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.312000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.312000 audit: BPF prog-id=137 op=LOAD Dec 13 14:19:41.312000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdb5a773c0 a2=98 a3=3 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.312000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.312000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:19:41.313000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.313000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.313000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.313000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.313000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.313000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.313000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.313000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.313000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.313000 audit: BPF prog-id=138 op=LOAD Dec 13 14:19:41.313000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb5a771a0 a2=74 a3=540051 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.313000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.313000 audit: BPF prog-id=138 op=UNLOAD Dec 13 14:19:41.313000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.313000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.313000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.313000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.313000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.313000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.313000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.313000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.313000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.313000 audit: BPF prog-id=139 op=LOAD Dec 13 14:19:41.313000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb5a771d0 a2=94 a3=2 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.313000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.313000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:19:41.438000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.438000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.438000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.438000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.438000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.438000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.438000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.438000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.438000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.438000 audit: BPF prog-id=140 op=LOAD Dec 13 14:19:41.438000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdb5a77090 a2=40 a3=1 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.438000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.438000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:19:41.438000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.438000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdb5a77160 a2=50 a3=7ffdb5a77240 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.438000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb5a770a0 a2=28 a3=0 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.449000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb5a770d0 a2=28 a3=0 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.449000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb5a76fe0 a2=28 a3=0 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.449000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb5a770f0 a2=28 a3=0 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.449000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb5a770d0 a2=28 a3=0 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.449000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb5a770c0 a2=28 a3=0 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.449000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb5a770f0 a2=28 a3=0 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.449000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb5a770d0 a2=28 a3=0 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.449000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb5a770f0 a2=28 a3=0 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.449000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdb5a770c0 a2=28 a3=0 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.449000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdb5a77130 a2=28 a3=0 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.449000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdb5a76ee0 a2=50 a3=1 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.449000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit: BPF prog-id=141 op=LOAD Dec 13 14:19:41.449000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdb5a76ee0 a2=94 a3=5 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.449000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.449000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdb5a76f90 a2=50 a3=1 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.449000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdb5a770b0 a2=4 a3=38 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.449000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.449000 audit[3203]: AVC avc: denied { confidentiality } for pid=3203 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:41.449000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdb5a77100 a2=94 a3=6 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.449000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { confidentiality } for pid=3203 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:41.450000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdb5a768b0 a2=94 a3=83 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.450000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { perfmon } for pid=3203 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { confidentiality } for pid=3203 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:41.450000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdb5a768b0 a2=94 a3=83 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.450000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=0 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.450000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=28 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.450000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.450000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.450000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=29 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.450000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=2a items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=2b items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=2c items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=2d items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=2e items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=2f items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=30 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=31 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=32 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=33 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=34 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=35 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=36 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=37 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=3a items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=3b items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=3e items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=44 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=4a items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=5e items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=61 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=62 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=65 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=68 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=69 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=6c items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=6f items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.451000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.451000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=70 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.451000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.452000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.452000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=73 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.452000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.452000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.452000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=74 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.452000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.452000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.452000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=77 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.452000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.452000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.452000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=78 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.452000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.452000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.452000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=7b items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.452000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.452000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.452000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=7c items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.452000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.452000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.452000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=7f items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.452000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.452000 audit[3203]: AVC avc: denied { bpf } for pid=3203 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.452000 audit[3203]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdb5a782f0 a2=10 a3=80 items=0 ppid=3181 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.452000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C697374002D2D6A736F6E Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit: BPF prog-id=142 op=LOAD Dec 13 14:19:41.459000 audit[3207]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf13e27a0 a2=98 a3=1999999999999999 items=0 ppid=3181 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.459000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:19:41.459000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit: BPF prog-id=143 op=LOAD Dec 13 14:19:41.459000 audit[3207]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf13e2680 a2=74 a3=ffff items=0 ppid=3181 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.459000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:19:41.459000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:41.459000 audit: BPF prog-id=144 op=LOAD Dec 13 14:19:41.459000 audit[3207]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdf13e26c0 a2=40 a3=7ffdf13e28a0 items=0 ppid=3181 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:41.459000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:19:41.459000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:19:41.524106 kubelet[1451]: E1213 14:19:41.524048 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:42.241579 kubelet[1451]: E1213 14:19:42.238689 1451 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 14:19:42.524461 kubelet[1451]: E1213 14:19:42.524258 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:42.920270 env[1197]: time="2024-12-13T14:19:42.920119140Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:42.923847 env[1197]: time="2024-12-13T14:19:42.923747028Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:42.927212 env[1197]: time="2024-12-13T14:19:42.927162085Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:42.929600 env[1197]: time="2024-12-13T14:19:42.929539864Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:42.929898 env[1197]: time="2024-12-13T14:19:42.929852611Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 14:19:42.945674 env[1197]: time="2024-12-13T14:19:42.945620802Z" level=info msg="CreateContainer within sandbox \"a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:19:42.976192 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1856063026.mount: Deactivated successfully. Dec 13 14:19:42.984530 env[1197]: time="2024-12-13T14:19:42.984467260Z" level=info msg="CreateContainer within sandbox \"a3719f6b281b3be66c2174df5b90f0ad6a0e9f44f744e86fe16c4e20c626af8a\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"a4545a7fc30bf17b7882f8eaa1cdd7823a3017bd60bf818c6e29d513d2a1cd91\"" Dec 13 14:19:42.985684 env[1197]: time="2024-12-13T14:19:42.985595199Z" level=info msg="StartContainer for \"a4545a7fc30bf17b7882f8eaa1cdd7823a3017bd60bf818c6e29d513d2a1cd91\"" Dec 13 14:19:43.005520 systemd[1]: Started cri-containerd-a4545a7fc30bf17b7882f8eaa1cdd7823a3017bd60bf818c6e29d513d2a1cd91.scope. Dec 13 14:19:43.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.020651 kernel: kauditd_printk_skb: 597 callbacks suppressed Dec 13 14:19:43.020711 kernel: audit: type=1400 audit(1734099583.017:916): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.034337 kernel: audit: type=1400 audit(1734099583.017:917): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.034506 kernel: audit: type=1400 audit(1734099583.017:918): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.034535 kernel: audit: type=1400 audit(1734099583.017:919): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.041757 kernel: audit: type=1400 audit(1734099583.017:920): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.041853 kernel: audit: type=1400 audit(1734099583.017:921): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.045419 kernel: audit: type=1400 audit(1734099583.017:922): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.052974 kernel: audit: type=1400 audit(1734099583.017:923): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.053095 kernel: audit: type=1400 audit(1734099583.017:924): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.053187 kernel: audit: type=1400 audit(1734099583.022:925): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.022000 audit: BPF prog-id=145 op=LOAD Dec 13 14:19:43.022000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.022000 audit[3267]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2896 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:43.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134353435613766633330626631376237383832663865616131636464 Dec 13 14:19:43.022000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.022000 audit[3267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2896 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:43.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134353435613766633330626631376237383832663865616131636464 Dec 13 14:19:43.023000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.023000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.023000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.023000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.023000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.023000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.023000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.023000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.023000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.023000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.023000 audit: BPF prog-id=146 op=LOAD Dec 13 14:19:43.023000 audit[3267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003d0500 items=0 ppid=2896 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:43.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134353435613766633330626631376237383832663865616131636464 Dec 13 14:19:43.025000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.025000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.025000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.025000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.025000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.025000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.025000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.025000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.025000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.025000 audit: BPF prog-id=147 op=LOAD Dec 13 14:19:43.025000 audit[3267]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003d0548 items=0 ppid=2896 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:43.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134353435613766633330626631376237383832663865616131636464 Dec 13 14:19:43.029000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:19:43.029000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:19:43.029000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.029000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.029000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.029000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.029000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.029000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.029000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.029000 audit[3267]: AVC avc: denied { perfmon } for pid=3267 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.029000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.029000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:43.029000 audit: BPF prog-id=148 op=LOAD Dec 13 14:19:43.029000 audit[3267]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003d0958 items=0 ppid=2896 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:43.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134353435613766633330626631376237383832663865616131636464 Dec 13 14:19:43.100920 env[1197]: time="2024-12-13T14:19:43.100845377Z" level=info msg="StartContainer for \"a4545a7fc30bf17b7882f8eaa1cdd7823a3017bd60bf818c6e29d513d2a1cd91\" returns successfully" Dec 13 14:19:43.279867 kubelet[1451]: I1213 14:19:43.279775 1451 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-b796d77-drp9f" podStartSLOduration=1.446270917 podStartE2EDuration="10.279751816s" podCreationTimestamp="2024-12-13 14:19:33 +0000 UTC" firstStartedPulling="2024-12-13 14:19:34.098024528 +0000 UTC m=+51.183988413" lastFinishedPulling="2024-12-13 14:19:42.931505417 +0000 UTC m=+60.017469312" observedRunningTime="2024-12-13 14:19:43.279259131 +0000 UTC m=+60.365223046" watchObservedRunningTime="2024-12-13 14:19:43.279751816 +0000 UTC m=+60.365715701" Dec 13 14:19:43.484568 kubelet[1451]: E1213 14:19:43.484507 1451 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:43.507033 env[1197]: time="2024-12-13T14:19:43.506981740Z" level=info msg="StopPodSandbox for \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\"" Dec 13 14:19:43.525368 kubelet[1451]: E1213 14:19:43.525320 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:43.603319 env[1197]: 2024-12-13 14:19:43.558 [WARNING][3335] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"3b528162-9bb1-45dc-8cce-d10e751eb6ae", ResourceVersion:"1109", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 19, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.25", ContainerID:"72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c", Pod:"nginx-deployment-85f456d6dd-5md2d", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calieebadfdb9e9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:19:43.603319 env[1197]: 2024-12-13 14:19:43.558 [INFO][3335] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Dec 13 14:19:43.603319 env[1197]: 2024-12-13 14:19:43.558 [INFO][3335] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" iface="eth0" netns="" Dec 13 14:19:43.603319 env[1197]: 2024-12-13 14:19:43.558 [INFO][3335] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Dec 13 14:19:43.603319 env[1197]: 2024-12-13 14:19:43.558 [INFO][3335] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Dec 13 14:19:43.603319 env[1197]: 2024-12-13 14:19:43.589 [INFO][3342] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" HandleID="k8s-pod-network.cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Workload="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0" Dec 13 14:19:43.603319 env[1197]: 2024-12-13 14:19:43.590 [INFO][3342] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:19:43.603319 env[1197]: 2024-12-13 14:19:43.590 [INFO][3342] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:19:43.603319 env[1197]: 2024-12-13 14:19:43.597 [WARNING][3342] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" HandleID="k8s-pod-network.cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Workload="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0" Dec 13 14:19:43.603319 env[1197]: 2024-12-13 14:19:43.598 [INFO][3342] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" HandleID="k8s-pod-network.cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Workload="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0" Dec 13 14:19:43.603319 env[1197]: 2024-12-13 14:19:43.600 [INFO][3342] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:19:43.603319 env[1197]: 2024-12-13 14:19:43.601 [INFO][3335] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Dec 13 14:19:43.603319 env[1197]: time="2024-12-13T14:19:43.603262123Z" level=info msg="TearDown network for sandbox \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\" successfully" Dec 13 14:19:43.603319 env[1197]: time="2024-12-13T14:19:43.603301947Z" level=info msg="StopPodSandbox for \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\" returns successfully" Dec 13 14:19:43.604062 env[1197]: time="2024-12-13T14:19:43.604003435Z" level=info msg="RemovePodSandbox for \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\"" Dec 13 14:19:43.604105 env[1197]: time="2024-12-13T14:19:43.604031479Z" level=info msg="Forcibly stopping sandbox \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\"" Dec 13 14:19:43.705016 env[1197]: 2024-12-13 14:19:43.657 [WARNING][3366] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"3b528162-9bb1-45dc-8cce-d10e751eb6ae", ResourceVersion:"1109", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 19, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.25", ContainerID:"72b54fef4baaa6fa2a5eff423a15c81e022de398e4ee7dc69729472bb042205c", Pod:"nginx-deployment-85f456d6dd-5md2d", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calieebadfdb9e9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:19:43.705016 env[1197]: 2024-12-13 14:19:43.658 [INFO][3366] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Dec 13 14:19:43.705016 env[1197]: 2024-12-13 14:19:43.658 [INFO][3366] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" iface="eth0" netns="" Dec 13 14:19:43.705016 env[1197]: 2024-12-13 14:19:43.658 [INFO][3366] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Dec 13 14:19:43.705016 env[1197]: 2024-12-13 14:19:43.658 [INFO][3366] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Dec 13 14:19:43.705016 env[1197]: 2024-12-13 14:19:43.694 [INFO][3373] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" HandleID="k8s-pod-network.cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Workload="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0" Dec 13 14:19:43.705016 env[1197]: 2024-12-13 14:19:43.694 [INFO][3373] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:19:43.705016 env[1197]: 2024-12-13 14:19:43.694 [INFO][3373] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:19:43.705016 env[1197]: 2024-12-13 14:19:43.700 [WARNING][3373] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" HandleID="k8s-pod-network.cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Workload="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0" Dec 13 14:19:43.705016 env[1197]: 2024-12-13 14:19:43.700 [INFO][3373] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" HandleID="k8s-pod-network.cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Workload="10.0.0.25-k8s-nginx--deployment--85f456d6dd--5md2d-eth0" Dec 13 14:19:43.705016 env[1197]: 2024-12-13 14:19:43.702 [INFO][3373] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:19:43.705016 env[1197]: 2024-12-13 14:19:43.703 [INFO][3366] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb" Dec 13 14:19:43.705558 env[1197]: time="2024-12-13T14:19:43.705049301Z" level=info msg="TearDown network for sandbox \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\" successfully" Dec 13 14:19:43.942010 env[1197]: time="2024-12-13T14:19:43.941889833Z" level=info msg="RemovePodSandbox \"cc90157d8f7a341b051f45813ab9696ff1eee061717474f3383ccd84ade51ceb\" returns successfully" Dec 13 14:19:43.942661 env[1197]: time="2024-12-13T14:19:43.942626206Z" level=info msg="StopPodSandbox for \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\"" Dec 13 14:19:44.000227 env[1197]: 2024-12-13 14:19:43.972 [WARNING][3403] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.25-k8s-csi--node--driver--bzpg8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cfc8d7f2-8854-4340-849a-9ba30c93a44e", ResourceVersion:"1128", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.25", ContainerID:"af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6", Pod:"csi-node-driver-bzpg8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.34.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0b9f4187d31", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:19:44.000227 env[1197]: 2024-12-13 14:19:43.972 [INFO][3403] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Dec 13 14:19:44.000227 env[1197]: 2024-12-13 14:19:43.972 [INFO][3403] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" iface="eth0" netns="" Dec 13 14:19:44.000227 env[1197]: 2024-12-13 14:19:43.972 [INFO][3403] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Dec 13 14:19:44.000227 env[1197]: 2024-12-13 14:19:43.972 [INFO][3403] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Dec 13 14:19:44.000227 env[1197]: 2024-12-13 14:19:43.989 [INFO][3411] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" HandleID="k8s-pod-network.2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Workload="10.0.0.25-k8s-csi--node--driver--bzpg8-eth0" Dec 13 14:19:44.000227 env[1197]: 2024-12-13 14:19:43.989 [INFO][3411] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:19:44.000227 env[1197]: 2024-12-13 14:19:43.990 [INFO][3411] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:19:44.000227 env[1197]: 2024-12-13 14:19:43.995 [WARNING][3411] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" HandleID="k8s-pod-network.2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Workload="10.0.0.25-k8s-csi--node--driver--bzpg8-eth0" Dec 13 14:19:44.000227 env[1197]: 2024-12-13 14:19:43.995 [INFO][3411] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" HandleID="k8s-pod-network.2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Workload="10.0.0.25-k8s-csi--node--driver--bzpg8-eth0" Dec 13 14:19:44.000227 env[1197]: 2024-12-13 14:19:43.997 [INFO][3411] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:19:44.000227 env[1197]: 2024-12-13 14:19:43.999 [INFO][3403] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Dec 13 14:19:44.000844 env[1197]: time="2024-12-13T14:19:44.000252240Z" level=info msg="TearDown network for sandbox \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\" successfully" Dec 13 14:19:44.000844 env[1197]: time="2024-12-13T14:19:44.000287787Z" level=info msg="StopPodSandbox for \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\" returns successfully" Dec 13 14:19:44.000910 env[1197]: time="2024-12-13T14:19:44.000856736Z" level=info msg="RemovePodSandbox for \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\"" Dec 13 14:19:44.000959 env[1197]: time="2024-12-13T14:19:44.000886002Z" level=info msg="Forcibly stopping sandbox \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\"" Dec 13 14:19:44.104212 env[1197]: 2024-12-13 14:19:44.053 [WARNING][3433] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.25-k8s-csi--node--driver--bzpg8-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cfc8d7f2-8854-4340-849a-9ba30c93a44e", ResourceVersion:"1128", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 18, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.25", ContainerID:"af5643cc0192c4afc17225e8624fcef1fd8f74840827f7c8447f045c13e456c6", Pod:"csi-node-driver-bzpg8", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.34.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali0b9f4187d31", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:19:44.104212 env[1197]: 2024-12-13 14:19:44.053 [INFO][3433] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Dec 13 14:19:44.104212 env[1197]: 2024-12-13 14:19:44.053 [INFO][3433] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" iface="eth0" netns="" Dec 13 14:19:44.104212 env[1197]: 2024-12-13 14:19:44.053 [INFO][3433] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Dec 13 14:19:44.104212 env[1197]: 2024-12-13 14:19:44.053 [INFO][3433] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Dec 13 14:19:44.104212 env[1197]: 2024-12-13 14:19:44.087 [INFO][3440] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" HandleID="k8s-pod-network.2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Workload="10.0.0.25-k8s-csi--node--driver--bzpg8-eth0" Dec 13 14:19:44.104212 env[1197]: 2024-12-13 14:19:44.087 [INFO][3440] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:19:44.104212 env[1197]: 2024-12-13 14:19:44.087 [INFO][3440] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:19:44.104212 env[1197]: 2024-12-13 14:19:44.099 [WARNING][3440] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" HandleID="k8s-pod-network.2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Workload="10.0.0.25-k8s-csi--node--driver--bzpg8-eth0" Dec 13 14:19:44.104212 env[1197]: 2024-12-13 14:19:44.099 [INFO][3440] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" HandleID="k8s-pod-network.2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Workload="10.0.0.25-k8s-csi--node--driver--bzpg8-eth0" Dec 13 14:19:44.104212 env[1197]: 2024-12-13 14:19:44.101 [INFO][3440] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:19:44.104212 env[1197]: 2024-12-13 14:19:44.102 [INFO][3433] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da" Dec 13 14:19:44.104212 env[1197]: time="2024-12-13T14:19:44.103978601Z" level=info msg="TearDown network for sandbox \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\" successfully" Dec 13 14:19:44.157284 env[1197]: time="2024-12-13T14:19:44.157166323Z" level=info msg="RemovePodSandbox \"2e9f8542979549bcc304b650148f553edf933faec277703d4f01f00022d318da\" returns successfully" Dec 13 14:19:44.526371 kubelet[1451]: E1213 14:19:44.526275 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:45.526869 kubelet[1451]: E1213 14:19:45.526781 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:46.527852 kubelet[1451]: E1213 14:19:46.527779 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:46.637578 kubelet[1451]: I1213 14:19:46.637505 1451 topology_manager.go:215] "Topology Admit Handler" podUID="b2e85476-52a9-45d7-aa35-d0003bd87962" podNamespace="default" podName="test-pod-1" Dec 13 14:19:46.644592 systemd[1]: Created slice kubepods-besteffort-podb2e85476_52a9_45d7_aa35_d0003bd87962.slice. Dec 13 14:19:46.799846 kubelet[1451]: I1213 14:19:46.799682 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-749ef2df-39cb-4e7a-8029-c97bc8012051\" (UniqueName: \"kubernetes.io/nfs/b2e85476-52a9-45d7-aa35-d0003bd87962-pvc-749ef2df-39cb-4e7a-8029-c97bc8012051\") pod \"test-pod-1\" (UID: \"b2e85476-52a9-45d7-aa35-d0003bd87962\") " pod="default/test-pod-1" Dec 13 14:19:46.799846 kubelet[1451]: I1213 14:19:46.799753 1451 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g77hd\" (UniqueName: \"kubernetes.io/projected/b2e85476-52a9-45d7-aa35-d0003bd87962-kube-api-access-g77hd\") pod \"test-pod-1\" (UID: \"b2e85476-52a9-45d7-aa35-d0003bd87962\") " pod="default/test-pod-1" Dec 13 14:19:46.934000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.934000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.939453 kernel: Failed to create system directory netfs Dec 13 14:19:46.939517 kernel: Failed to create system directory netfs Dec 13 14:19:46.939550 kernel: Failed to create system directory netfs Dec 13 14:19:46.934000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.934000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.941191 kernel: Failed to create system directory netfs Dec 13 14:19:46.934000 audit[3513]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a4bee135e0 a1=153bc a2=55a4ba2172b0 a3=5 items=0 ppid=511 pid=3513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:46.934000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:19:46.945000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.945000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.945000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.952229 kernel: Failed to create system directory fscache Dec 13 14:19:46.952431 kernel: Failed to create system directory fscache Dec 13 14:19:46.952462 kernel: Failed to create system directory fscache Dec 13 14:19:46.952491 kernel: Failed to create system directory fscache Dec 13 14:19:46.945000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.945000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.954124 kernel: Failed to create system directory fscache Dec 13 14:19:46.954307 kernel: Failed to create system directory fscache Dec 13 14:19:46.945000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.945000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.955857 kernel: Failed to create system directory fscache Dec 13 14:19:46.955929 kernel: Failed to create system directory fscache Dec 13 14:19:46.945000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.945000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.958386 kernel: Failed to create system directory fscache Dec 13 14:19:46.958691 kernel: Failed to create system directory fscache Dec 13 14:19:46.945000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.945000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.945000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.961366 kernel: Failed to create system directory fscache Dec 13 14:19:46.961425 kernel: Failed to create system directory fscache Dec 13 14:19:46.961455 kernel: Failed to create system directory fscache Dec 13 14:19:46.945000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.945000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.963253 kernel: Failed to create system directory fscache Dec 13 14:19:46.945000 audit[3513]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a4bf0289c0 a1=4c0fc a2=55a4ba2172b0 a3=5 items=0 ppid=511 pid=3513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:46.965531 kernel: FS-Cache: Loaded Dec 13 14:19:46.945000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.004033 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.004195 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.004249 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.005578 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.005687 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.007279 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.007357 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.009072 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.009123 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.010772 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.010860 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.012551 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.012599 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.014448 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.014646 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.016042 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.016111 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.017750 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.017947 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.020144 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.020184 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.020202 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.021756 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.021802 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.022604 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.023541 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.026136 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.026186 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.028067 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.028112 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.028128 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.029897 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.030018 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.030757 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.031640 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.033651 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.033738 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.034566 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.036168 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.036242 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.037388 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.038190 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.038993 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.041007 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.041077 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.041995 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.042840 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.044362 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.044755 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.047080 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.047131 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.047156 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.048683 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.048722 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.049662 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.052585 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.052757 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.053722 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.055143 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.055330 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.056058 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.057948 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.058085 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.059904 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.059980 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.061635 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.061705 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.063486 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.063531 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.064442 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.066204 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.066262 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.068093 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.068152 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.069698 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.069748 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.072081 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.072150 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.072173 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.073769 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.073804 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.075492 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.075608 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.076984 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.077027 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.077826 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.079432 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.079478 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.080971 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.081024 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.082658 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.082751 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.085039 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.085095 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.085117 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.086765 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.086846 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.088588 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.088789 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.090315 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.090422 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.091235 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.092973 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.093028 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.093777 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.094678 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.096110 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.096147 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.097635 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.097678 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.098424 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.099984 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.100005 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.101566 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.101605 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.103143 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.103167 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.104677 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.104716 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.106980 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.107030 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.107057 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.108516 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.108550 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.110085 kernel: Failed to create system directory sunrpc Dec 13 14:19:47.110132 kernel: Failed to create system directory sunrpc Dec 13 14:19:46.990000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.121563 kernel: RPC: Registered named UNIX socket transport module. Dec 13 14:19:47.121751 kernel: RPC: Registered udp transport module. Dec 13 14:19:47.121772 kernel: RPC: Registered tcp transport module. Dec 13 14:19:47.123146 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 14:19:46.990000 audit[3513]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a4bf074ad0 a1=1a7f1c a2=55a4ba2172b0 a3=5 items=6 ppid=511 pid=3513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:46.990000 audit: CWD cwd="/" Dec 13 14:19:46.990000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:46.990000 audit: PATH item=1 name=(null) inode=25058 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:46.990000 audit: PATH item=2 name=(null) inode=25058 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:46.990000 audit: PATH item=3 name=(null) inode=25059 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:46.990000 audit: PATH item=4 name=(null) inode=25058 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:46.990000 audit: PATH item=5 name=(null) inode=25060 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:19:46.990000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.211981 kernel: Failed to create system directory nfs Dec 13 14:19:47.212038 kernel: Failed to create system directory nfs Dec 13 14:19:47.212062 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.213432 kernel: Failed to create system directory nfs Dec 13 14:19:47.213464 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.214892 kernel: Failed to create system directory nfs Dec 13 14:19:47.214929 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.217080 kernel: Failed to create system directory nfs Dec 13 14:19:47.217116 kernel: Failed to create system directory nfs Dec 13 14:19:47.217145 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.218527 kernel: Failed to create system directory nfs Dec 13 14:19:47.218558 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.219964 kernel: Failed to create system directory nfs Dec 13 14:19:47.219997 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.222134 kernel: Failed to create system directory nfs Dec 13 14:19:47.222169 kernel: Failed to create system directory nfs Dec 13 14:19:47.222184 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.223718 kernel: Failed to create system directory nfs Dec 13 14:19:47.223773 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.225199 kernel: Failed to create system directory nfs Dec 13 14:19:47.225243 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.226793 kernel: Failed to create system directory nfs Dec 13 14:19:47.226830 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.227489 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.228862 kernel: Failed to create system directory nfs Dec 13 14:19:47.228909 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.230934 kernel: Failed to create system directory nfs Dec 13 14:19:47.230967 kernel: Failed to create system directory nfs Dec 13 14:19:47.230992 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.232999 kernel: Failed to create system directory nfs Dec 13 14:19:47.233026 kernel: Failed to create system directory nfs Dec 13 14:19:47.233049 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.234469 kernel: Failed to create system directory nfs Dec 13 14:19:47.234513 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.235906 kernel: Failed to create system directory nfs Dec 13 14:19:47.235938 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.238072 kernel: Failed to create system directory nfs Dec 13 14:19:47.238110 kernel: Failed to create system directory nfs Dec 13 14:19:47.238130 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.239534 kernel: Failed to create system directory nfs Dec 13 14:19:47.239569 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.241006 kernel: Failed to create system directory nfs Dec 13 14:19:47.241040 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.242460 kernel: Failed to create system directory nfs Dec 13 14:19:47.242499 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.255859 kernel: Failed to create system directory nfs Dec 13 14:19:47.255979 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.257564 kernel: Failed to create system directory nfs Dec 13 14:19:47.257615 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.258477 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.260376 kernel: Failed to create system directory nfs Dec 13 14:19:47.260679 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.262166 kernel: Failed to create system directory nfs Dec 13 14:19:47.262290 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.262998 kernel: Failed to create system directory nfs Dec 13 14:19:47.265075 kernel: Failed to create system directory nfs Dec 13 14:19:47.265225 kernel: Failed to create system directory nfs Dec 13 14:19:47.265261 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.266513 kernel: Failed to create system directory nfs Dec 13 14:19:47.266556 kernel: Failed to create system directory nfs Dec 13 14:19:47.197000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.197000 audit[3513]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a4bf295700 a1=16e97c a2=55a4ba2172b0 a3=5 items=0 ppid=511 pid=3513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:47.290536 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 14:19:47.197000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.333061 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.333114 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.333132 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.334747 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.334777 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.337136 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.337188 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.337215 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.337909 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.340161 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.340219 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.340267 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.341837 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.341901 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.343450 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.343500 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.352506 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.352542 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.354272 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.354306 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.356074 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.356116 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.357020 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.358746 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.358794 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.360508 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.360548 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.362258 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.362297 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.364058 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.364100 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.365854 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.367027 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.368040 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.368103 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.369970 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.370061 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.370798 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.372987 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.373908 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.373962 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.375685 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.376607 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.376643 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.378991 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.379032 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.379077 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.380637 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.380681 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.382057 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.382089 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.383550 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.383586 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.385013 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.385059 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.386483 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.386505 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.388064 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.388085 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.389523 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.389552 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.397426 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.397476 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.398957 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.399009 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.399734 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.402107 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.402143 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.402173 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.403840 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.404044 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.405276 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.405426 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.406152 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.407935 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.407979 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.409693 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.409730 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.425103 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.425140 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.426687 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.426727 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.427512 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.428995 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.429025 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.429798 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.431445 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.431484 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.433149 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.433200 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.434746 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.434787 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.435461 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.317000 audit[3525]: AVC avc: denied { confidentiality } for pid=3525 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.436850 kernel: Failed to create system directory nfs4 Dec 13 14:19:47.528906 kubelet[1451]: E1213 14:19:47.528826 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:47.583749 kernel: NFS: Registering the id_resolver key type Dec 13 14:19:47.583990 kernel: Key type id_resolver registered Dec 13 14:19:47.584027 kernel: Key type id_legacy registered Dec 13 14:19:47.317000 audit[3525]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fe822264010 a1=208de4 a2=5647cd7ac2b0 a3=5 items=0 ppid=511 pid=3525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:47.317000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.615679 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.615805 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.615953 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.617747 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.617785 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.619530 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.619564 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.622192 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.622225 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.622239 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.623964 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.624025 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.625780 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.625828 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.627584 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.627624 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.636925 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.637052 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.638442 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.640122 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.640195 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.641517 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.641541 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.643041 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.643085 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.599000 audit[3527]: AVC avc: denied { confidentiality } for pid=3527 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:19:47.644997 kernel: Failed to create system directory rpcgss Dec 13 14:19:47.599000 audit[3527]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f728bfb5010 a1=70af4 a2=55876f52c2b0 a3=5 items=0 ppid=511 pid=3527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:47.599000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 14:19:47.693827 nfsidmap[3550]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 14:19:47.697060 nfsidmap[3553]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 14:19:47.705000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2780 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:19:47.705000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2780 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:19:47.705000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2780 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:19:47.705000 audit[1270]: AVC avc: denied { watch_reads } for pid=1270 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2780 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:19:47.705000 audit[1270]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ab25c82ea0 a2=10 a3=b3afdfcb1e5e2a91 items=0 ppid=1 pid=1270 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:47.705000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:19:47.705000 audit[1270]: AVC avc: denied { watch_reads } for pid=1270 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2780 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:19:47.705000 audit[1270]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ab25c82ea0 a2=10 a3=b3afdfcb1e5e2a91 items=0 ppid=1 pid=1270 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:47.705000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:19:47.705000 audit[1270]: AVC avc: denied { watch_reads } for pid=1270 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2780 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 14:19:47.705000 audit[1270]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55ab25c82ea0 a2=10 a3=b3afdfcb1e5e2a91 items=0 ppid=1 pid=1270 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:47.705000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 14:19:47.848180 env[1197]: time="2024-12-13T14:19:47.848057614Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:b2e85476-52a9-45d7-aa35-d0003bd87962,Namespace:default,Attempt:0,}" Dec 13 14:19:48.155389 systemd-networkd[1031]: cali5ec59c6bf6e: Link UP Dec 13 14:19:48.158512 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:19:48.158583 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 14:19:48.158577 systemd-networkd[1031]: cali5ec59c6bf6e: Gained carrier Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.027 [INFO][3557] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.25-k8s-test--pod--1-eth0 default b2e85476-52a9-45d7-aa35-d0003bd87962 1381 0 2024-12-13 14:19:30 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.25 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.25-k8s-test--pod--1-" Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.027 [INFO][3557] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.25-k8s-test--pod--1-eth0" Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.072 [INFO][3569] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430" HandleID="k8s-pod-network.8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430" Workload="10.0.0.25-k8s-test--pod--1-eth0" Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.084 [INFO][3569] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430" HandleID="k8s-pod-network.8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430" Workload="10.0.0.25-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000289140), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.25", "pod":"test-pod-1", "timestamp":"2024-12-13 14:19:48.072931688 +0000 UTC"}, Hostname:"10.0.0.25", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.084 [INFO][3569] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.085 [INFO][3569] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.085 [INFO][3569] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.25' Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.087 [INFO][3569] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430" host="10.0.0.25" Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.092 [INFO][3569] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.25" Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.097 [INFO][3569] ipam/ipam.go 489: Trying affinity for 192.168.34.0/26 host="10.0.0.25" Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.100 [INFO][3569] ipam/ipam.go 155: Attempting to load block cidr=192.168.34.0/26 host="10.0.0.25" Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.103 [INFO][3569] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.0/26 host="10.0.0.25" Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.103 [INFO][3569] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.0/26 handle="k8s-pod-network.8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430" host="10.0.0.25" Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.105 [INFO][3569] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430 Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.130 [INFO][3569] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.34.0/26 handle="k8s-pod-network.8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430" host="10.0.0.25" Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.151 [INFO][3569] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.34.5/26] block=192.168.34.0/26 handle="k8s-pod-network.8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430" host="10.0.0.25" Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.151 [INFO][3569] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.5/26] handle="k8s-pod-network.8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430" host="10.0.0.25" Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.151 [INFO][3569] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.151 [INFO][3569] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.5/26] IPv6=[] ContainerID="8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430" HandleID="k8s-pod-network.8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430" Workload="10.0.0.25-k8s-test--pod--1-eth0" Dec 13 14:19:48.182104 env[1197]: 2024-12-13 14:19:48.153 [INFO][3557] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.25-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.25-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"b2e85476-52a9-45d7-aa35-d0003bd87962", ResourceVersion:"1381", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 19, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.25", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:19:48.182973 env[1197]: 2024-12-13 14:19:48.153 [INFO][3557] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.34.5/32] ContainerID="8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.25-k8s-test--pod--1-eth0" Dec 13 14:19:48.182973 env[1197]: 2024-12-13 14:19:48.153 [INFO][3557] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.25-k8s-test--pod--1-eth0" Dec 13 14:19:48.182973 env[1197]: 2024-12-13 14:19:48.159 [INFO][3557] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.25-k8s-test--pod--1-eth0" Dec 13 14:19:48.182973 env[1197]: 2024-12-13 14:19:48.159 [INFO][3557] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.25-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.25-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"b2e85476-52a9-45d7-aa35-d0003bd87962", ResourceVersion:"1381", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 19, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.25", ContainerID:"8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.34.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"0e:42:34:36:bb:c4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:19:48.182973 env[1197]: 2024-12-13 14:19:48.179 [INFO][3557] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.25-k8s-test--pod--1-eth0" Dec 13 14:19:48.198916 env[1197]: time="2024-12-13T14:19:48.198829725Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:19:48.198916 env[1197]: time="2024-12-13T14:19:48.198872776Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:19:48.198916 env[1197]: time="2024-12-13T14:19:48.198884257Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:19:48.199136 env[1197]: time="2024-12-13T14:19:48.199041423Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430 pid=3594 runtime=io.containerd.runc.v2 Dec 13 14:19:48.220000 systemd[1]: run-containerd-runc-k8s.io-8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430-runc.1Bhst6.mount: Deactivated successfully. Dec 13 14:19:48.222527 systemd[1]: Started cri-containerd-8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430.scope. Dec 13 14:19:48.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.236918 kernel: kauditd_printk_skb: 402 callbacks suppressed Dec 13 14:19:48.236967 kernel: audit: type=1400 audit(1734099588.234:946): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.246188 kernel: audit: type=1400 audit(1734099588.234:947): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.246332 kernel: audit: type=1400 audit(1734099588.234:948): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.252374 kernel: audit: type=1400 audit(1734099588.234:949): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.252442 kernel: audit: type=1400 audit(1734099588.234:950): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.259295 kernel: audit: type=1400 audit(1734099588.234:951): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.262863 kernel: audit: type=1400 audit(1734099588.234:952): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.263109 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:19:48.265863 kernel: audit: type=1400 audit(1734099588.234:953): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.265917 kernel: audit: type=1400 audit(1734099588.234:954): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.272280 kernel: audit: type=1400 audit(1734099588.239:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.239000 audit: BPF prog-id=149 op=LOAD Dec 13 14:19:48.239000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.239000 audit[3605]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3594 pid=3605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:48.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864623363623265353436666137303936313866613262656631383630 Dec 13 14:19:48.239000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.239000 audit[3605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3594 pid=3605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:48.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864623363623265353436666137303936313866613262656631383630 Dec 13 14:19:48.239000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.239000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.239000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.239000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.239000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.239000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.239000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.239000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.239000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.239000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.239000 audit: BPF prog-id=150 op=LOAD Dec 13 14:19:48.239000 audit[3605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00032d280 items=0 ppid=3594 pid=3605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:48.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864623363623265353436666137303936313866613262656631383630 Dec 13 14:19:48.248000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.248000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.248000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.248000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.248000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.248000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.248000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.248000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.248000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.248000 audit: BPF prog-id=151 op=LOAD Dec 13 14:19:48.248000 audit[3605]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00032d2c8 items=0 ppid=3594 pid=3605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:48.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864623363623265353436666137303936313866613262656631383630 Dec 13 14:19:48.255000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:19:48.255000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:19:48.255000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.255000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.255000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.255000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.255000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.255000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.255000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.255000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.255000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.255000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:48.255000 audit: BPF prog-id=152 op=LOAD Dec 13 14:19:48.255000 audit[3605]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00032d6d8 items=0 ppid=3594 pid=3605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:48.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864623363623265353436666137303936313866613262656631383630 Dec 13 14:19:48.294703 env[1197]: time="2024-12-13T14:19:48.294635111Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:b2e85476-52a9-45d7-aa35-d0003bd87962,Namespace:default,Attempt:0,} returns sandbox id \"8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430\"" Dec 13 14:19:48.296427 env[1197]: time="2024-12-13T14:19:48.296381480Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 14:19:48.529485 kubelet[1451]: E1213 14:19:48.529424 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:48.960025 env[1197]: time="2024-12-13T14:19:48.959937521Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:48.982888 env[1197]: time="2024-12-13T14:19:48.982816286Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:49.000088 env[1197]: time="2024-12-13T14:19:48.999983605Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:49.011858 env[1197]: time="2024-12-13T14:19:49.011798881Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:19:49.012656 env[1197]: time="2024-12-13T14:19:49.012623580Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:fa0a8cea5e76ad962111c39c85bb312edaf5b89eccd8f404eeea66c9759641e3\"" Dec 13 14:19:49.015228 env[1197]: time="2024-12-13T14:19:49.015187795Z" level=info msg="CreateContainer within sandbox \"8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 14:19:49.228254 env[1197]: time="2024-12-13T14:19:49.228091359Z" level=info msg="CreateContainer within sandbox \"8db3cb2e546fa709618fa2bef1860e95432958de6f19a34513ac3db4e1cdc430\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"0e49449c22ce04cfd0f0da322494c8129bb1ab3345473af09d98a05e52c180c1\"" Dec 13 14:19:49.229105 env[1197]: time="2024-12-13T14:19:49.229059577Z" level=info msg="StartContainer for \"0e49449c22ce04cfd0f0da322494c8129bb1ab3345473af09d98a05e52c180c1\"" Dec 13 14:19:49.246238 systemd[1]: Started cri-containerd-0e49449c22ce04cfd0f0da322494c8129bb1ab3345473af09d98a05e52c180c1.scope. Dec 13 14:19:49.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.256000 audit: BPF prog-id=153 op=LOAD Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3594 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:49.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065343934343963323263653034636664306630646133323234393463 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3594 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:49.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065343934343963323263653034636664306630646133323234393463 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit: BPF prog-id=154 op=LOAD Dec 13 14:19:49.257000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032c440 items=0 ppid=3594 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:49.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065343934343963323263653034636664306630646133323234393463 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit: BPF prog-id=155 op=LOAD Dec 13 14:19:49.257000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032c488 items=0 ppid=3594 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:49.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065343934343963323263653034636664306630646133323234393463 Dec 13 14:19:49.257000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:19:49.257000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { perfmon } for pid=3656 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit[3656]: AVC avc: denied { bpf } for pid=3656 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:19:49.257000 audit: BPF prog-id=156 op=LOAD Dec 13 14:19:49.257000 audit[3656]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00032c898 items=0 ppid=3594 pid=3656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:49.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065343934343963323263653034636664306630646133323234393463 Dec 13 14:19:49.313629 env[1197]: time="2024-12-13T14:19:49.313366035Z" level=info msg="StartContainer for \"0e49449c22ce04cfd0f0da322494c8129bb1ab3345473af09d98a05e52c180c1\" returns successfully" Dec 13 14:19:49.530064 kubelet[1451]: E1213 14:19:49.529873 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:50.053660 systemd-networkd[1031]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 14:19:50.530515 kubelet[1451]: E1213 14:19:50.530435 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:51.531434 kubelet[1451]: E1213 14:19:51.531339 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:52.531652 kubelet[1451]: E1213 14:19:52.531576 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:53.532630 kubelet[1451]: E1213 14:19:53.532583 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 14:19:54.533259 kubelet[1451]: E1213 14:19:54.533194 1451 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"