Dec 13 13:57:55.732676 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Dec 13 13:57:55.732695 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Dec 13 12:58:58 -00 2024 Dec 13 13:57:55.732713 kernel: efi: EFI v2.70 by EDK II Dec 13 13:57:55.732719 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Dec 13 13:57:55.732739 kernel: random: crng init done Dec 13 13:57:55.732748 kernel: ACPI: Early table checksum verification disabled Dec 13 13:57:55.732755 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Dec 13 13:57:55.732763 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Dec 13 13:57:55.732769 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:57:55.732774 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:57:55.732780 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:57:55.732785 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:57:55.732790 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:57:55.732795 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:57:55.732804 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:57:55.732810 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:57:55.732816 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:57:55.732822 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Dec 13 13:57:55.732827 kernel: NUMA: Failed to initialise from firmware Dec 13 13:57:55.732833 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Dec 13 13:57:55.732839 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] Dec 13 13:57:55.732844 kernel: Zone ranges: Dec 13 13:57:55.732850 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Dec 13 13:57:55.732857 kernel: DMA32 empty Dec 13 13:57:55.732862 kernel: Normal empty Dec 13 13:57:55.732868 kernel: Movable zone start for each node Dec 13 13:57:55.732874 kernel: Early memory node ranges Dec 13 13:57:55.732879 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Dec 13 13:57:55.732885 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Dec 13 13:57:55.732893 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Dec 13 13:57:55.732900 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Dec 13 13:57:55.732905 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Dec 13 13:57:55.732911 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Dec 13 13:57:55.732917 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Dec 13 13:57:55.732922 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Dec 13 13:57:55.732930 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Dec 13 13:57:55.732935 kernel: psci: probing for conduit method from ACPI. Dec 13 13:57:55.732941 kernel: psci: PSCIv1.1 detected in firmware. Dec 13 13:57:55.732946 kernel: psci: Using standard PSCI v0.2 function IDs Dec 13 13:57:55.732952 kernel: psci: Trusted OS migration not required Dec 13 13:57:55.732961 kernel: psci: SMC Calling Convention v1.1 Dec 13 13:57:55.732967 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Dec 13 13:57:55.732974 kernel: ACPI: SRAT not present Dec 13 13:57:55.732980 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Dec 13 13:57:55.732987 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Dec 13 13:57:55.732993 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Dec 13 13:57:55.732999 kernel: Detected PIPT I-cache on CPU0 Dec 13 13:57:55.733005 kernel: CPU features: detected: GIC system register CPU interface Dec 13 13:57:55.733011 kernel: CPU features: detected: Hardware dirty bit management Dec 13 13:57:55.733017 kernel: CPU features: detected: Spectre-v4 Dec 13 13:57:55.733023 kernel: CPU features: detected: Spectre-BHB Dec 13 13:57:55.733030 kernel: CPU features: kernel page table isolation forced ON by KASLR Dec 13 13:57:55.733036 kernel: CPU features: detected: Kernel page table isolation (KPTI) Dec 13 13:57:55.733042 kernel: CPU features: detected: ARM erratum 1418040 Dec 13 13:57:55.733048 kernel: CPU features: detected: SSBS not fully self-synchronizing Dec 13 13:57:55.733054 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Dec 13 13:57:55.733060 kernel: Policy zone: DMA Dec 13 13:57:55.733067 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 13:57:55.733074 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 13:57:55.733080 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 13:57:55.733086 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 13:57:55.733092 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 13:57:55.733100 kernel: Memory: 2457404K/2572288K available (9792K kernel code, 2092K rwdata, 7576K rodata, 36416K init, 777K bss, 114884K reserved, 0K cma-reserved) Dec 13 13:57:55.733106 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 13:57:55.733112 kernel: trace event string verifier disabled Dec 13 13:57:55.733118 kernel: rcu: Preemptible hierarchical RCU implementation. Dec 13 13:57:55.733125 kernel: rcu: RCU event tracing is enabled. Dec 13 13:57:55.733131 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 13:57:55.733137 kernel: Trampoline variant of Tasks RCU enabled. Dec 13 13:57:55.733143 kernel: Tracing variant of Tasks RCU enabled. Dec 13 13:57:55.733149 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 13:57:55.733155 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 13:57:55.733161 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Dec 13 13:57:55.733169 kernel: GICv3: 256 SPIs implemented Dec 13 13:57:55.733175 kernel: GICv3: 0 Extended SPIs implemented Dec 13 13:57:55.733181 kernel: GICv3: Distributor has no Range Selector support Dec 13 13:57:55.733187 kernel: Root IRQ handler: gic_handle_irq Dec 13 13:57:55.733193 kernel: GICv3: 16 PPIs implemented Dec 13 13:57:55.733199 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Dec 13 13:57:55.733205 kernel: ACPI: SRAT not present Dec 13 13:57:55.733210 kernel: ITS [mem 0x08080000-0x0809ffff] Dec 13 13:57:55.733217 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Dec 13 13:57:55.733223 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Dec 13 13:57:55.733229 kernel: GICv3: using LPI property table @0x00000000400d0000 Dec 13 13:57:55.733235 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Dec 13 13:57:55.733242 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 13:57:55.733248 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Dec 13 13:57:55.733255 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Dec 13 13:57:55.733261 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Dec 13 13:57:55.733267 kernel: arm-pv: using stolen time PV Dec 13 13:57:55.733273 kernel: Console: colour dummy device 80x25 Dec 13 13:57:55.733279 kernel: ACPI: Core revision 20210730 Dec 13 13:57:55.733286 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Dec 13 13:57:55.733292 kernel: pid_max: default: 32768 minimum: 301 Dec 13 13:57:55.733298 kernel: LSM: Security Framework initializing Dec 13 13:57:55.733306 kernel: SELinux: Initializing. Dec 13 13:57:55.733312 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 13:57:55.733319 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 13:57:55.733325 kernel: rcu: Hierarchical SRCU implementation. Dec 13 13:57:55.733332 kernel: Platform MSI: ITS@0x8080000 domain created Dec 13 13:57:55.733338 kernel: PCI/MSI: ITS@0x8080000 domain created Dec 13 13:57:55.733344 kernel: Remapping and enabling EFI services. Dec 13 13:57:55.733351 kernel: smp: Bringing up secondary CPUs ... Dec 13 13:57:55.733357 kernel: Detected PIPT I-cache on CPU1 Dec 13 13:57:55.733368 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Dec 13 13:57:55.733375 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Dec 13 13:57:55.733381 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 13:57:55.733388 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Dec 13 13:57:55.733407 kernel: Detected PIPT I-cache on CPU2 Dec 13 13:57:55.733414 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Dec 13 13:57:55.733420 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Dec 13 13:57:55.733427 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 13:57:55.733433 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Dec 13 13:57:55.733439 kernel: Detected PIPT I-cache on CPU3 Dec 13 13:57:55.733447 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Dec 13 13:57:55.733453 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Dec 13 13:57:55.733459 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 13:57:55.733466 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Dec 13 13:57:55.733476 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 13:57:55.733484 kernel: SMP: Total of 4 processors activated. Dec 13 13:57:55.733491 kernel: CPU features: detected: 32-bit EL0 Support Dec 13 13:57:55.733497 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Dec 13 13:57:55.733504 kernel: CPU features: detected: Common not Private translations Dec 13 13:57:55.733510 kernel: CPU features: detected: CRC32 instructions Dec 13 13:57:55.733517 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Dec 13 13:57:55.733523 kernel: CPU features: detected: LSE atomic instructions Dec 13 13:57:55.733531 kernel: CPU features: detected: Privileged Access Never Dec 13 13:57:55.733539 kernel: CPU features: detected: RAS Extension Support Dec 13 13:57:55.733546 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Dec 13 13:57:55.733552 kernel: CPU: All CPU(s) started at EL1 Dec 13 13:57:55.733559 kernel: alternatives: patching kernel code Dec 13 13:57:55.733567 kernel: devtmpfs: initialized Dec 13 13:57:55.733573 kernel: KASLR enabled Dec 13 13:57:55.733580 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 13:57:55.733587 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 13:57:55.733593 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 13:57:55.733599 kernel: SMBIOS 3.0.0 present. Dec 13 13:57:55.733607 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Dec 13 13:57:55.733613 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 13:57:55.733620 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Dec 13 13:57:55.733628 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 13 13:57:55.733635 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 13 13:57:55.733641 kernel: audit: initializing netlink subsys (disabled) Dec 13 13:57:55.733648 kernel: audit: type=2000 audit(0.031:1): state=initialized audit_enabled=0 res=1 Dec 13 13:57:55.733654 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 13:57:55.733661 kernel: cpuidle: using governor menu Dec 13 13:57:55.733667 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Dec 13 13:57:55.733674 kernel: ASID allocator initialised with 32768 entries Dec 13 13:57:55.733680 kernel: ACPI: bus type PCI registered Dec 13 13:57:55.733688 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 13:57:55.733695 kernel: Serial: AMBA PL011 UART driver Dec 13 13:57:55.733708 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 13:57:55.733714 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Dec 13 13:57:55.733721 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 13:57:55.733733 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Dec 13 13:57:55.733740 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 13:57:55.733747 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Dec 13 13:57:55.733753 kernel: ACPI: Added _OSI(Module Device) Dec 13 13:57:55.733762 kernel: ACPI: Added _OSI(Processor Device) Dec 13 13:57:55.733769 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 13:57:55.733775 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 13:57:55.733782 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 13:57:55.733788 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 13:57:55.733795 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 13:57:55.733802 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 13:57:55.733808 kernel: ACPI: Interpreter enabled Dec 13 13:57:55.733815 kernel: ACPI: Using GIC for interrupt routing Dec 13 13:57:55.733823 kernel: ACPI: MCFG table detected, 1 entries Dec 13 13:57:55.733830 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Dec 13 13:57:55.733836 kernel: printk: console [ttyAMA0] enabled Dec 13 13:57:55.733843 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 13:57:55.733962 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 13:57:55.734024 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Dec 13 13:57:55.734081 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Dec 13 13:57:55.734140 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Dec 13 13:57:55.734195 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Dec 13 13:57:55.734203 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Dec 13 13:57:55.734210 kernel: PCI host bridge to bus 0000:00 Dec 13 13:57:55.734279 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Dec 13 13:57:55.734333 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Dec 13 13:57:55.734387 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Dec 13 13:57:55.734441 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 13:57:55.734511 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Dec 13 13:57:55.734578 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 13:57:55.734639 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Dec 13 13:57:55.734706 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Dec 13 13:57:55.734779 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Dec 13 13:57:55.734842 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Dec 13 13:57:55.734903 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Dec 13 13:57:55.734962 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Dec 13 13:57:55.735014 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Dec 13 13:57:55.735065 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Dec 13 13:57:55.735116 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Dec 13 13:57:55.735125 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Dec 13 13:57:55.735131 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Dec 13 13:57:55.735138 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Dec 13 13:57:55.735146 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Dec 13 13:57:55.735153 kernel: iommu: Default domain type: Translated Dec 13 13:57:55.735160 kernel: iommu: DMA domain TLB invalidation policy: strict mode Dec 13 13:57:55.735166 kernel: vgaarb: loaded Dec 13 13:57:55.735173 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 13:57:55.735179 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 13:57:55.735186 kernel: PTP clock support registered Dec 13 13:57:55.735192 kernel: Registered efivars operations Dec 13 13:57:55.735199 kernel: clocksource: Switched to clocksource arch_sys_counter Dec 13 13:57:55.735207 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 13:57:55.735213 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 13:57:55.735220 kernel: pnp: PnP ACPI init Dec 13 13:57:55.735282 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Dec 13 13:57:55.735292 kernel: pnp: PnP ACPI: found 1 devices Dec 13 13:57:55.735298 kernel: NET: Registered PF_INET protocol family Dec 13 13:57:55.735305 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 13:57:55.735312 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 13:57:55.735319 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 13:57:55.735326 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 13:57:55.735333 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 13:57:55.735340 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 13:57:55.735346 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 13:57:55.735353 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 13:57:55.735359 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 13:57:55.735366 kernel: PCI: CLS 0 bytes, default 64 Dec 13 13:57:55.735373 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Dec 13 13:57:55.735381 kernel: kvm [1]: HYP mode not available Dec 13 13:57:55.735387 kernel: Initialise system trusted keyrings Dec 13 13:57:55.735394 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 13:57:55.735400 kernel: Key type asymmetric registered Dec 13 13:57:55.735407 kernel: Asymmetric key parser 'x509' registered Dec 13 13:57:55.735413 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 13:57:55.735420 kernel: io scheduler mq-deadline registered Dec 13 13:57:55.735426 kernel: io scheduler kyber registered Dec 13 13:57:55.735433 kernel: io scheduler bfq registered Dec 13 13:57:55.735440 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Dec 13 13:57:55.735447 kernel: ACPI: button: Power Button [PWRB] Dec 13 13:57:55.735454 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Dec 13 13:57:55.735511 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Dec 13 13:57:55.735520 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 13:57:55.735527 kernel: thunder_xcv, ver 1.0 Dec 13 13:57:55.735534 kernel: thunder_bgx, ver 1.0 Dec 13 13:57:55.735540 kernel: nicpf, ver 1.0 Dec 13 13:57:55.735546 kernel: nicvf, ver 1.0 Dec 13 13:57:55.735620 kernel: rtc-efi rtc-efi.0: registered as rtc0 Dec 13 13:57:55.735675 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-12-13T13:57:55 UTC (1734098275) Dec 13 13:57:55.735683 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 13:57:55.735690 kernel: NET: Registered PF_INET6 protocol family Dec 13 13:57:55.735704 kernel: Segment Routing with IPv6 Dec 13 13:57:55.735712 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 13:57:55.735719 kernel: NET: Registered PF_PACKET protocol family Dec 13 13:57:55.735733 kernel: Key type dns_resolver registered Dec 13 13:57:55.735743 kernel: registered taskstats version 1 Dec 13 13:57:55.735749 kernel: Loading compiled-in X.509 certificates Dec 13 13:57:55.735756 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e011ba9949ade5a6d03f7a5e28171f7f59e70f8a' Dec 13 13:57:55.735762 kernel: Key type .fscrypt registered Dec 13 13:57:55.735769 kernel: Key type fscrypt-provisioning registered Dec 13 13:57:55.735776 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 13:57:55.735782 kernel: ima: Allocated hash algorithm: sha1 Dec 13 13:57:55.735789 kernel: ima: No architecture policies found Dec 13 13:57:55.735795 kernel: clk: Disabling unused clocks Dec 13 13:57:55.735803 kernel: Freeing unused kernel memory: 36416K Dec 13 13:57:55.735810 kernel: Run /init as init process Dec 13 13:57:55.735816 kernel: with arguments: Dec 13 13:57:55.735823 kernel: /init Dec 13 13:57:55.735829 kernel: with environment: Dec 13 13:57:55.735835 kernel: HOME=/ Dec 13 13:57:55.735841 kernel: TERM=linux Dec 13 13:57:55.735848 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 13:57:55.735856 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 13:57:55.735866 systemd[1]: Detected virtualization kvm. Dec 13 13:57:55.735874 systemd[1]: Detected architecture arm64. Dec 13 13:57:55.735880 systemd[1]: Running in initrd. Dec 13 13:57:55.735887 systemd[1]: No hostname configured, using default hostname. Dec 13 13:57:55.735894 systemd[1]: Hostname set to . Dec 13 13:57:55.735902 systemd[1]: Initializing machine ID from VM UUID. Dec 13 13:57:55.735908 systemd[1]: Queued start job for default target initrd.target. Dec 13 13:57:55.735916 systemd[1]: Started systemd-ask-password-console.path. Dec 13 13:57:55.735923 systemd[1]: Reached target cryptsetup.target. Dec 13 13:57:55.735930 systemd[1]: Reached target paths.target. Dec 13 13:57:55.735937 systemd[1]: Reached target slices.target. Dec 13 13:57:55.735944 systemd[1]: Reached target swap.target. Dec 13 13:57:55.735950 systemd[1]: Reached target timers.target. Dec 13 13:57:55.735958 systemd[1]: Listening on iscsid.socket. Dec 13 13:57:55.735986 systemd[1]: Listening on iscsiuio.socket. Dec 13 13:57:55.735994 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 13:57:55.736001 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 13:57:55.736008 systemd[1]: Listening on systemd-journald.socket. Dec 13 13:57:55.736015 systemd[1]: Listening on systemd-networkd.socket. Dec 13 13:57:55.736023 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 13:57:55.736029 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 13:57:55.736036 systemd[1]: Reached target sockets.target. Dec 13 13:57:55.736043 systemd[1]: Starting kmod-static-nodes.service... Dec 13 13:57:55.736052 systemd[1]: Finished network-cleanup.service. Dec 13 13:57:55.736059 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 13:57:55.736066 systemd[1]: Starting systemd-journald.service... Dec 13 13:57:55.736073 systemd[1]: Starting systemd-modules-load.service... Dec 13 13:57:55.736079 systemd[1]: Starting systemd-resolved.service... Dec 13 13:57:55.736086 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 13:57:55.736093 systemd[1]: Finished kmod-static-nodes.service. Dec 13 13:57:55.736100 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 13:57:55.736107 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 13:57:55.736115 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 13:57:55.736123 kernel: audit: type=1130 audit(1734098275.733:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:55.736130 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 13:57:55.736140 systemd-journald[289]: Journal started Dec 13 13:57:55.736181 systemd-journald[289]: Runtime Journal (/run/log/journal/8cc75414b780459889e99299b00bc78d) is 6.0M, max 48.7M, 42.6M free. Dec 13 13:57:55.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:55.729175 systemd-modules-load[290]: Inserted module 'overlay' Dec 13 13:57:55.742305 systemd[1]: Started systemd-journald.service. Dec 13 13:57:55.742339 kernel: audit: type=1130 audit(1734098275.739:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:55.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:55.742945 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 13:57:55.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:55.746749 kernel: audit: type=1130 audit(1734098275.743:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:55.753617 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 13:57:55.758964 kernel: audit: type=1130 audit(1734098275.754:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:55.758984 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 13:57:55.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:55.755080 systemd[1]: Starting dracut-cmdline.service... Dec 13 13:57:55.757106 systemd-resolved[291]: Positive Trust Anchors: Dec 13 13:57:55.757123 systemd-resolved[291]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 13:57:55.757150 systemd-resolved[291]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 13:57:55.768759 kernel: Bridge firewalling registered Dec 13 13:57:55.768746 systemd-modules-load[290]: Inserted module 'br_netfilter' Dec 13 13:57:55.771112 systemd-resolved[291]: Defaulting to hostname 'linux'. Dec 13 13:57:55.771839 dracut-cmdline[307]: dracut-dracut-053 Dec 13 13:57:55.775861 kernel: audit: type=1130 audit(1734098275.771:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:55.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:55.775912 dracut-cmdline[307]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 13:57:55.771948 systemd[1]: Started systemd-resolved.service. Dec 13 13:57:55.772612 systemd[1]: Reached target nss-lookup.target. Dec 13 13:57:55.783740 kernel: SCSI subsystem initialized Dec 13 13:57:55.791309 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 13:57:55.791334 kernel: device-mapper: uevent: version 1.0.3 Dec 13 13:57:55.791349 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 13:57:55.793936 systemd-modules-load[290]: Inserted module 'dm_multipath' Dec 13 13:57:55.794829 systemd[1]: Finished systemd-modules-load.service. Dec 13 13:57:55.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:55.796252 systemd[1]: Starting systemd-sysctl.service... Dec 13 13:57:55.798977 kernel: audit: type=1130 audit(1734098275.794:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:55.804807 systemd[1]: Finished systemd-sysctl.service. Dec 13 13:57:55.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:55.808757 kernel: audit: type=1130 audit(1734098275.804:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:55.835770 kernel: Loading iSCSI transport class v2.0-870. Dec 13 13:57:55.851763 kernel: iscsi: registered transport (tcp) Dec 13 13:57:55.866754 kernel: iscsi: registered transport (qla4xxx) Dec 13 13:57:55.866798 kernel: QLogic iSCSI HBA Driver Dec 13 13:57:55.906232 systemd[1]: Finished dracut-cmdline.service. Dec 13 13:57:55.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:55.910736 kernel: audit: type=1130 audit(1734098275.906:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:55.914852 systemd[1]: Starting dracut-pre-udev.service... Dec 13 13:57:55.964748 kernel: raid6: neonx8 gen() 13482 MB/s Dec 13 13:57:55.983455 kernel: raid6: neonx8 xor() 10665 MB/s Dec 13 13:57:55.999751 kernel: raid6: neonx4 gen() 12767 MB/s Dec 13 13:57:56.016741 kernel: raid6: neonx4 xor() 10990 MB/s Dec 13 13:57:56.033747 kernel: raid6: neonx2 gen() 12802 MB/s Dec 13 13:57:56.050752 kernel: raid6: neonx2 xor() 10325 MB/s Dec 13 13:57:56.067747 kernel: raid6: neonx1 gen() 10259 MB/s Dec 13 13:57:56.084745 kernel: raid6: neonx1 xor() 8750 MB/s Dec 13 13:57:56.101741 kernel: raid6: int64x8 gen() 6188 MB/s Dec 13 13:57:56.118740 kernel: raid6: int64x8 xor() 3417 MB/s Dec 13 13:57:56.135741 kernel: raid6: int64x4 gen() 7127 MB/s Dec 13 13:57:56.152747 kernel: raid6: int64x4 xor() 3829 MB/s Dec 13 13:57:56.169759 kernel: raid6: int64x2 gen() 6041 MB/s Dec 13 13:57:56.186749 kernel: raid6: int64x2 xor() 3310 MB/s Dec 13 13:57:56.203759 kernel: raid6: int64x1 gen() 5037 MB/s Dec 13 13:57:56.220993 kernel: raid6: int64x1 xor() 2642 MB/s Dec 13 13:57:56.221023 kernel: raid6: using algorithm neonx8 gen() 13482 MB/s Dec 13 13:57:56.221033 kernel: raid6: .... xor() 10665 MB/s, rmw enabled Dec 13 13:57:56.221042 kernel: raid6: using neon recovery algorithm Dec 13 13:57:56.234011 kernel: xor: measuring software checksum speed Dec 13 13:57:56.234036 kernel: 8regs : 17145 MB/sec Dec 13 13:57:56.234045 kernel: 32regs : 20738 MB/sec Dec 13 13:57:56.235045 kernel: arm64_neon : 27644 MB/sec Dec 13 13:57:56.235063 kernel: xor: using function: arm64_neon (27644 MB/sec) Dec 13 13:57:56.290754 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Dec 13 13:57:56.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:56.303831 systemd[1]: Finished dracut-pre-udev.service. Dec 13 13:57:56.306834 kernel: audit: type=1130 audit(1734098276.303:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:56.306000 audit: BPF prog-id=7 op=LOAD Dec 13 13:57:56.306000 audit: BPF prog-id=8 op=LOAD Dec 13 13:57:56.307499 systemd[1]: Starting systemd-udevd.service... Dec 13 13:57:56.335507 systemd-udevd[490]: Using default interface naming scheme 'v252'. Dec 13 13:57:56.339039 systemd[1]: Started systemd-udevd.service. Dec 13 13:57:56.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:56.343089 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 13:57:56.355842 dracut-pre-trigger[504]: rd.md=0: removing MD RAID activation Dec 13 13:57:56.385751 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 13:57:56.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:56.387142 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 13:57:56.426926 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 13:57:56.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:56.453745 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 13:57:56.463736 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 13:57:56.463754 kernel: GPT:9289727 != 19775487 Dec 13 13:57:56.463763 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 13:57:56.463772 kernel: GPT:9289727 != 19775487 Dec 13 13:57:56.463780 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 13:57:56.463788 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 13:57:56.486088 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 13:57:56.487569 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 13:57:56.493128 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 13:57:56.500752 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (556) Dec 13 13:57:56.503359 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 13:57:56.504978 systemd[1]: Starting disk-uuid.service... Dec 13 13:57:56.512253 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 13:57:56.513974 disk-uuid[564]: Primary Header is updated. Dec 13 13:57:56.513974 disk-uuid[564]: Secondary Entries is updated. Dec 13 13:57:56.513974 disk-uuid[564]: Secondary Header is updated. Dec 13 13:57:56.519751 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 13:57:57.531346 disk-uuid[565]: The operation has completed successfully. Dec 13 13:57:57.532233 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 13:57:57.552198 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 13:57:57.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:57.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:57.552284 systemd[1]: Finished disk-uuid.service. Dec 13 13:57:57.553854 systemd[1]: Starting verity-setup.service... Dec 13 13:57:57.569428 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Dec 13 13:57:57.587446 systemd[1]: Found device dev-mapper-usr.device. Dec 13 13:57:57.589411 systemd[1]: Mounting sysusr-usr.mount... Dec 13 13:57:57.591180 systemd[1]: Finished verity-setup.service. Dec 13 13:57:57.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:57.633670 systemd[1]: Mounted sysusr-usr.mount. Dec 13 13:57:57.634684 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 13:57:57.634363 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 13:57:57.635056 systemd[1]: Starting ignition-setup.service... Dec 13 13:57:57.636679 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 13:57:57.644166 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 13:57:57.644196 kernel: BTRFS info (device vda6): using free space tree Dec 13 13:57:57.644206 kernel: BTRFS info (device vda6): has skinny extents Dec 13 13:57:57.651582 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 13:57:57.659038 systemd[1]: Finished ignition-setup.service. Dec 13 13:57:57.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:57.660511 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 13:57:57.718555 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 13:57:57.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:57.719000 audit: BPF prog-id=9 op=LOAD Dec 13 13:57:57.720665 systemd[1]: Starting systemd-networkd.service... Dec 13 13:57:57.746812 ignition[658]: Ignition 2.14.0 Dec 13 13:57:57.746821 ignition[658]: Stage: fetch-offline Dec 13 13:57:57.746855 ignition[658]: no configs at "/usr/lib/ignition/base.d" Dec 13 13:57:57.746864 ignition[658]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 13:57:57.746989 ignition[658]: parsed url from cmdline: "" Dec 13 13:57:57.746992 ignition[658]: no config URL provided Dec 13 13:57:57.746997 ignition[658]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 13:57:57.747003 ignition[658]: no config at "/usr/lib/ignition/user.ign" Dec 13 13:57:57.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:57.747021 ignition[658]: op(1): [started] loading QEMU firmware config module Dec 13 13:57:57.753818 systemd-networkd[740]: lo: Link UP Dec 13 13:57:57.747025 ignition[658]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 13:57:57.753821 systemd-networkd[740]: lo: Gained carrier Dec 13 13:57:57.752505 ignition[658]: op(1): [finished] loading QEMU firmware config module Dec 13 13:57:57.754165 systemd-networkd[740]: Enumeration completed Dec 13 13:57:57.754257 systemd[1]: Started systemd-networkd.service. Dec 13 13:57:57.754331 systemd-networkd[740]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 13:57:57.755208 systemd[1]: Reached target network.target. Dec 13 13:57:57.756637 systemd[1]: Starting iscsiuio.service... Dec 13 13:57:57.763350 systemd-networkd[740]: eth0: Link UP Dec 13 13:57:57.763356 systemd-networkd[740]: eth0: Gained carrier Dec 13 13:57:57.764927 ignition[658]: parsing config with SHA512: a8f46647812ea226a1966d54c1871780ee1c7966afc1937401e33b84000420cb9dcd7c617f3bc24b83446f3de61559411092a6ac6df7846d293af2d23ee5a0a3 Dec 13 13:57:57.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:57.769845 systemd[1]: Started iscsiuio.service. Dec 13 13:57:57.771526 systemd[1]: Starting iscsid.service... Dec 13 13:57:57.776695 iscsid[746]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 13:57:57.776695 iscsid[746]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 13:57:57.776695 iscsid[746]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 13:57:57.776695 iscsid[746]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 13:57:57.776695 iscsid[746]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 13:57:57.776695 iscsid[746]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 13:57:57.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:57.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:57.778073 unknown[658]: fetched base config from "system" Dec 13 13:57:57.778444 ignition[658]: fetch-offline: fetch-offline passed Dec 13 13:57:57.778084 unknown[658]: fetched user config from "qemu" Dec 13 13:57:57.778509 ignition[658]: Ignition finished successfully Dec 13 13:57:57.780003 systemd[1]: Started iscsid.service. Dec 13 13:57:57.782850 systemd[1]: Starting dracut-initqueue.service... Dec 13 13:57:57.784535 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 13:57:57.785991 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 13:57:57.786644 systemd[1]: Starting ignition-kargs.service... Dec 13 13:57:57.787242 systemd-networkd[740]: eth0: DHCPv4 address 10.0.0.30/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 13:57:57.793849 systemd[1]: Finished dracut-initqueue.service. Dec 13 13:57:57.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:57.795409 systemd[1]: Reached target remote-fs-pre.target. Dec 13 13:57:57.794712 ignition[749]: Ignition 2.14.0 Dec 13 13:57:57.797225 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 13:57:57.794717 ignition[749]: Stage: kargs Dec 13 13:57:57.798386 systemd[1]: Reached target remote-fs.target. Dec 13 13:57:57.794820 ignition[749]: no configs at "/usr/lib/ignition/base.d" Dec 13 13:57:57.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:57.800127 systemd[1]: Starting dracut-pre-mount.service... Dec 13 13:57:57.794829 ignition[749]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 13:57:57.801102 systemd[1]: Finished ignition-kargs.service. Dec 13 13:57:57.795487 ignition[749]: kargs: kargs passed Dec 13 13:57:57.802749 systemd[1]: Starting ignition-disks.service... Dec 13 13:57:57.795520 ignition[749]: Ignition finished successfully Dec 13 13:57:57.808023 systemd[1]: Finished dracut-pre-mount.service. Dec 13 13:57:57.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:57.808716 ignition[764]: Ignition 2.14.0 Dec 13 13:57:57.808721 ignition[764]: Stage: disks Dec 13 13:57:57.810549 systemd[1]: Finished ignition-disks.service. Dec 13 13:57:57.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:57.808834 ignition[764]: no configs at "/usr/lib/ignition/base.d" Dec 13 13:57:57.811560 systemd[1]: Reached target initrd-root-device.target. Dec 13 13:57:57.808843 ignition[764]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 13:57:57.812604 systemd[1]: Reached target local-fs-pre.target. Dec 13 13:57:57.809478 ignition[764]: disks: disks passed Dec 13 13:57:57.813694 systemd[1]: Reached target local-fs.target. Dec 13 13:57:57.809510 ignition[764]: Ignition finished successfully Dec 13 13:57:57.814841 systemd[1]: Reached target sysinit.target. Dec 13 13:57:57.816073 systemd[1]: Reached target basic.target. Dec 13 13:57:57.817850 systemd[1]: Starting systemd-fsck-root.service... Dec 13 13:57:57.827534 systemd-fsck[777]: ROOT: clean, 621/553520 files, 56020/553472 blocks Dec 13 13:57:57.831124 systemd[1]: Finished systemd-fsck-root.service. Dec 13 13:57:57.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:57.832576 systemd[1]: Mounting sysroot.mount... Dec 13 13:57:57.838745 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 13:57:57.838778 systemd[1]: Mounted sysroot.mount. Dec 13 13:57:57.839386 systemd[1]: Reached target initrd-root-fs.target. Dec 13 13:57:57.841273 systemd[1]: Mounting sysroot-usr.mount... Dec 13 13:57:57.842016 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 13:57:57.842052 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 13:57:57.842076 systemd[1]: Reached target ignition-diskful.target. Dec 13 13:57:57.843616 systemd[1]: Mounted sysroot-usr.mount. Dec 13 13:57:57.845223 systemd[1]: Starting initrd-setup-root.service... Dec 13 13:57:57.849029 initrd-setup-root[787]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 13:57:57.852813 initrd-setup-root[795]: cut: /sysroot/etc/group: No such file or directory Dec 13 13:57:57.856203 initrd-setup-root[803]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 13:57:57.859755 initrd-setup-root[811]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 13:57:57.884227 systemd[1]: Finished initrd-setup-root.service. Dec 13 13:57:57.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:57.885647 systemd[1]: Starting ignition-mount.service... Dec 13 13:57:57.886868 systemd[1]: Starting sysroot-boot.service... Dec 13 13:57:57.891570 bash[828]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 13:57:57.899416 ignition[830]: INFO : Ignition 2.14.0 Dec 13 13:57:57.900193 ignition[830]: INFO : Stage: mount Dec 13 13:57:57.900827 ignition[830]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 13:57:57.901543 ignition[830]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 13:57:57.902892 systemd[1]: Finished sysroot-boot.service. Dec 13 13:57:57.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:57.904473 ignition[830]: INFO : mount: mount passed Dec 13 13:57:57.905113 ignition[830]: INFO : Ignition finished successfully Dec 13 13:57:57.906373 systemd[1]: Finished ignition-mount.service. Dec 13 13:57:57.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:58.597498 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 13:57:58.602808 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (838) Dec 13 13:57:58.604173 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 13:57:58.604188 kernel: BTRFS info (device vda6): using free space tree Dec 13 13:57:58.604197 kernel: BTRFS info (device vda6): has skinny extents Dec 13 13:57:58.607150 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 13:57:58.608404 systemd[1]: Starting ignition-files.service... Dec 13 13:57:58.621228 ignition[858]: INFO : Ignition 2.14.0 Dec 13 13:57:58.621228 ignition[858]: INFO : Stage: files Dec 13 13:57:58.622442 ignition[858]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 13:57:58.622442 ignition[858]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 13:57:58.622442 ignition[858]: DEBUG : files: compiled without relabeling support, skipping Dec 13 13:57:58.628208 ignition[858]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 13:57:58.628208 ignition[858]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 13:57:58.633439 ignition[858]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 13:57:58.634557 ignition[858]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 13:57:58.634557 ignition[858]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 13:57:58.634557 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 13:57:58.634043 unknown[858]: wrote ssh authorized keys file for user: core Dec 13 13:57:58.638748 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 13:57:58.638748 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 13:57:58.638748 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 13:57:58.638748 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 13:57:58.638748 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 13:57:58.638748 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 13:57:58.638748 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-arm64.raw: attempt #1 Dec 13 13:57:58.912601 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Dec 13 13:57:59.109104 ignition[858]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 13:57:59.109104 ignition[858]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Dec 13 13:57:59.112184 ignition[858]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 13:57:59.112184 ignition[858]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 13:57:59.112184 ignition[858]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Dec 13 13:57:59.112184 ignition[858]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 13:57:59.112184 ignition[858]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 13:57:59.145664 ignition[858]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 13:57:59.147756 ignition[858]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 13:57:59.147756 ignition[858]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 13:57:59.147756 ignition[858]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 13:57:59.147756 ignition[858]: INFO : files: files passed Dec 13 13:57:59.147756 ignition[858]: INFO : Ignition finished successfully Dec 13 13:57:59.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.147790 systemd[1]: Finished ignition-files.service. Dec 13 13:57:59.150139 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 13:57:59.151011 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 13:57:59.156733 initrd-setup-root-after-ignition[883]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 13:57:59.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.151628 systemd[1]: Starting ignition-quench.service... Dec 13 13:57:59.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.159335 initrd-setup-root-after-ignition[886]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 13:57:59.156049 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 13:57:59.156130 systemd[1]: Finished ignition-quench.service. Dec 13 13:57:59.157430 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 13:57:59.158885 systemd[1]: Reached target ignition-complete.target. Dec 13 13:57:59.160417 systemd[1]: Starting initrd-parse-etc.service... Dec 13 13:57:59.171383 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 13:57:59.171472 systemd[1]: Finished initrd-parse-etc.service. Dec 13 13:57:59.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.172746 systemd[1]: Reached target initrd-fs.target. Dec 13 13:57:59.173617 systemd[1]: Reached target initrd.target. Dec 13 13:57:59.174712 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 13:57:59.175373 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 13:57:59.185306 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 13:57:59.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.186569 systemd[1]: Starting initrd-cleanup.service... Dec 13 13:57:59.194029 systemd[1]: Stopped target nss-lookup.target. Dec 13 13:57:59.194670 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 13:57:59.195723 systemd[1]: Stopped target timers.target. Dec 13 13:57:59.196677 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 13:57:59.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.196802 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 13:57:59.197714 systemd[1]: Stopped target initrd.target. Dec 13 13:57:59.198853 systemd[1]: Stopped target basic.target. Dec 13 13:57:59.199766 systemd[1]: Stopped target ignition-complete.target. Dec 13 13:57:59.200769 systemd[1]: Stopped target ignition-diskful.target. Dec 13 13:57:59.201712 systemd[1]: Stopped target initrd-root-device.target. Dec 13 13:57:59.202785 systemd[1]: Stopped target remote-fs.target. Dec 13 13:57:59.203786 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 13:57:59.204831 systemd[1]: Stopped target sysinit.target. Dec 13 13:57:59.205908 systemd[1]: Stopped target local-fs.target. Dec 13 13:57:59.206842 systemd[1]: Stopped target local-fs-pre.target. Dec 13 13:57:59.207772 systemd[1]: Stopped target swap.target. Dec 13 13:57:59.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.208765 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 13:57:59.208861 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 13:57:59.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.209862 systemd[1]: Stopped target cryptsetup.target. Dec 13 13:57:59.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.210706 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 13:57:59.210810 systemd[1]: Stopped dracut-initqueue.service. Dec 13 13:57:59.211904 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 13:57:59.211999 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 13:57:59.212956 systemd[1]: Stopped target paths.target. Dec 13 13:57:59.213914 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 13:57:59.218752 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 13:57:59.219532 systemd[1]: Stopped target slices.target. Dec 13 13:57:59.220634 systemd[1]: Stopped target sockets.target. Dec 13 13:57:59.221534 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 13:57:59.221600 systemd[1]: Closed iscsid.socket. Dec 13 13:57:59.222415 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 13:57:59.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.222476 systemd[1]: Closed iscsiuio.socket. Dec 13 13:57:59.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.223349 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 13:57:59.223439 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 13:57:59.224378 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 13:57:59.224465 systemd[1]: Stopped ignition-files.service. Dec 13 13:57:59.226155 systemd[1]: Stopping ignition-mount.service... Dec 13 13:57:59.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.227677 systemd[1]: Stopping sysroot-boot.service... Dec 13 13:57:59.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.228658 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 13:57:59.228849 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 13:57:59.229906 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 13:57:59.234055 ignition[899]: INFO : Ignition 2.14.0 Dec 13 13:57:59.234055 ignition[899]: INFO : Stage: umount Dec 13 13:57:59.234055 ignition[899]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 13:57:59.234055 ignition[899]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 13:57:59.234055 ignition[899]: INFO : umount: umount passed Dec 13 13:57:59.234055 ignition[899]: INFO : Ignition finished successfully Dec 13 13:57:59.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.230005 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 13:57:59.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.233969 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 13:57:59.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.234049 systemd[1]: Finished initrd-cleanup.service. Dec 13 13:57:59.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.234926 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 13:57:59.235000 systemd[1]: Stopped ignition-mount.service. Dec 13 13:57:59.238846 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 13:57:59.239649 systemd[1]: Stopped target network.target. Dec 13 13:57:59.240570 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 13:57:59.240619 systemd[1]: Stopped ignition-disks.service. Dec 13 13:57:59.241748 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 13:57:59.241785 systemd[1]: Stopped ignition-kargs.service. Dec 13 13:57:59.242347 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 13:57:59.242378 systemd[1]: Stopped ignition-setup.service. Dec 13 13:57:59.243581 systemd[1]: Stopping systemd-networkd.service... Dec 13 13:57:59.244793 systemd[1]: Stopping systemd-resolved.service... Dec 13 13:57:59.254159 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 13:57:59.254257 systemd[1]: Stopped systemd-resolved.service. Dec 13 13:57:59.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.256789 systemd-networkd[740]: eth0: DHCPv6 lease lost Dec 13 13:57:59.257801 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 13:57:59.257888 systemd[1]: Stopped systemd-networkd.service. Dec 13 13:57:59.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.259540 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 13:57:59.260000 audit: BPF prog-id=6 op=UNLOAD Dec 13 13:57:59.259570 systemd[1]: Closed systemd-networkd.socket. Dec 13 13:57:59.260987 systemd[1]: Stopping network-cleanup.service... Dec 13 13:57:59.261000 audit: BPF prog-id=9 op=UNLOAD Dec 13 13:57:59.262054 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 13:57:59.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.262104 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 13:57:59.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.263182 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 13:57:59.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.263216 systemd[1]: Stopped systemd-sysctl.service. Dec 13 13:57:59.264801 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 13:57:59.264838 systemd[1]: Stopped systemd-modules-load.service. Dec 13 13:57:59.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.265548 systemd[1]: Stopping systemd-udevd.service... Dec 13 13:57:59.269707 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 13:57:59.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.270178 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 13:57:59.270256 systemd[1]: Stopped sysroot-boot.service. Dec 13 13:57:59.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.271468 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 13:57:59.271512 systemd[1]: Stopped initrd-setup-root.service. Dec 13 13:57:59.273609 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 13:57:59.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.273700 systemd[1]: Stopped network-cleanup.service. Dec 13 13:57:59.276106 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 13:57:59.276221 systemd[1]: Stopped systemd-udevd.service. Dec 13 13:57:59.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.277177 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 13:57:59.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.277218 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 13:57:59.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.278131 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 13:57:59.278157 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 13:57:59.279069 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 13:57:59.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.279106 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 13:57:59.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.280176 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 13:57:59.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.280207 systemd[1]: Stopped dracut-cmdline.service. Dec 13 13:57:59.281208 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 13:57:59.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.281241 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 13:57:59.283211 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 13:57:59.284251 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 13:57:59.284298 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 13:57:59.285963 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 13:57:59.285995 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 13:57:59.286598 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 13:57:59.286630 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 13:57:59.288291 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 13:57:59.288661 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 13:57:59.288773 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 13:57:59.289503 systemd[1]: Reached target initrd-switch-root.target. Dec 13 13:57:59.291268 systemd[1]: Starting initrd-switch-root.service... Dec 13 13:57:59.297091 systemd[1]: Switching root. Dec 13 13:57:59.320031 iscsid[746]: iscsid shutting down. Dec 13 13:57:59.320530 systemd-journald[289]: Journal stopped Dec 13 13:58:01.258760 systemd-journald[289]: Received SIGTERM from PID 1 (systemd). Dec 13 13:58:01.258819 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 13:58:01.258831 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 13:58:01.258842 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 13:58:01.258851 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 13:58:01.258861 kernel: SELinux: policy capability open_perms=1 Dec 13 13:58:01.258875 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 13:58:01.258885 kernel: SELinux: policy capability always_check_network=0 Dec 13 13:58:01.258898 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 13:58:01.258908 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 13:58:01.258920 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 13:58:01.258933 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 13:58:01.258946 systemd[1]: Successfully loaded SELinux policy in 30.591ms. Dec 13 13:58:01.258963 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.691ms. Dec 13 13:58:01.258974 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 13:58:01.258989 systemd[1]: Detected virtualization kvm. Dec 13 13:58:01.259001 systemd[1]: Detected architecture arm64. Dec 13 13:58:01.259013 systemd[1]: Detected first boot. Dec 13 13:58:01.259023 systemd[1]: Initializing machine ID from VM UUID. Dec 13 13:58:01.259034 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 13:58:01.259044 systemd[1]: Populated /etc with preset unit settings. Dec 13 13:58:01.259054 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 13:58:01.259065 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 13:58:01.259077 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 13:58:01.259088 kernel: kauditd_printk_skb: 79 callbacks suppressed Dec 13 13:58:01.259098 kernel: audit: type=1334 audit(1734098281.133:83): prog-id=12 op=LOAD Dec 13 13:58:01.259108 kernel: audit: type=1334 audit(1734098281.133:84): prog-id=3 op=UNLOAD Dec 13 13:58:01.259118 kernel: audit: type=1334 audit(1734098281.133:85): prog-id=13 op=LOAD Dec 13 13:58:01.259127 kernel: audit: type=1334 audit(1734098281.134:86): prog-id=14 op=LOAD Dec 13 13:58:01.259136 kernel: audit: type=1334 audit(1734098281.134:87): prog-id=4 op=UNLOAD Dec 13 13:58:01.259146 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 13:58:01.259156 kernel: audit: type=1334 audit(1734098281.134:88): prog-id=5 op=UNLOAD Dec 13 13:58:01.259167 systemd[1]: Stopped iscsiuio.service. Dec 13 13:58:01.259178 kernel: audit: type=1131 audit(1734098281.135:89): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.259189 kernel: audit: type=1131 audit(1734098281.140:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.259199 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 13:58:01.259209 systemd[1]: Stopped iscsid.service. Dec 13 13:58:01.259220 kernel: audit: type=1131 audit(1734098281.143:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.259230 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 13:58:01.259240 systemd[1]: Stopped initrd-switch-root.service. Dec 13 13:58:01.259251 kernel: audit: type=1130 audit(1734098281.147:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.259266 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 13:58:01.259278 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 13:58:01.259288 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 13:58:01.259298 systemd[1]: Created slice system-getty.slice. Dec 13 13:58:01.259309 systemd[1]: Created slice system-modprobe.slice. Dec 13 13:58:01.259320 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 13:58:01.259330 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 13:58:01.259340 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 13:58:01.259350 systemd[1]: Created slice user.slice. Dec 13 13:58:01.259361 systemd[1]: Started systemd-ask-password-console.path. Dec 13 13:58:01.259372 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 13:58:01.259382 systemd[1]: Set up automount boot.automount. Dec 13 13:58:01.259393 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 13:58:01.259403 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 13:58:01.259414 systemd[1]: Stopped target initrd-fs.target. Dec 13 13:58:01.259427 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 13:58:01.259437 systemd[1]: Reached target integritysetup.target. Dec 13 13:58:01.259448 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 13:58:01.259458 systemd[1]: Reached target remote-fs.target. Dec 13 13:58:01.259468 systemd[1]: Reached target slices.target. Dec 13 13:58:01.259478 systemd[1]: Reached target swap.target. Dec 13 13:58:01.259489 systemd[1]: Reached target torcx.target. Dec 13 13:58:01.259499 systemd[1]: Reached target veritysetup.target. Dec 13 13:58:01.259509 systemd[1]: Listening on systemd-coredump.socket. Dec 13 13:58:01.259520 systemd[1]: Listening on systemd-initctl.socket. Dec 13 13:58:01.259531 systemd[1]: Listening on systemd-networkd.socket. Dec 13 13:58:01.259545 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 13:58:01.259555 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 13:58:01.259566 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 13:58:01.259576 systemd[1]: Mounting dev-hugepages.mount... Dec 13 13:58:01.259586 systemd[1]: Mounting dev-mqueue.mount... Dec 13 13:58:01.259596 systemd[1]: Mounting media.mount... Dec 13 13:58:01.259607 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 13:58:01.259617 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 13:58:01.259629 systemd[1]: Mounting tmp.mount... Dec 13 13:58:01.259639 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 13:58:01.259649 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 13:58:01.259660 systemd[1]: Starting kmod-static-nodes.service... Dec 13 13:58:01.259670 systemd[1]: Starting modprobe@configfs.service... Dec 13 13:58:01.259686 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 13:58:01.259697 systemd[1]: Starting modprobe@drm.service... Dec 13 13:58:01.259709 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 13:58:01.259719 systemd[1]: Starting modprobe@fuse.service... Dec 13 13:58:01.259772 systemd[1]: Starting modprobe@loop.service... Dec 13 13:58:01.259784 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 13:58:01.259795 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 13:58:01.259805 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 13:58:01.259815 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 13:58:01.259825 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 13:58:01.259835 systemd[1]: Stopped systemd-journald.service. Dec 13 13:58:01.259844 kernel: fuse: init (API version 7.34) Dec 13 13:58:01.259854 systemd[1]: Starting systemd-journald.service... Dec 13 13:58:01.259865 kernel: loop: module loaded Dec 13 13:58:01.259875 systemd[1]: Starting systemd-modules-load.service... Dec 13 13:58:01.259885 systemd[1]: Starting systemd-network-generator.service... Dec 13 13:58:01.259896 systemd[1]: Starting systemd-remount-fs.service... Dec 13 13:58:01.259907 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 13:58:01.259918 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 13:58:01.259928 systemd[1]: Stopped verity-setup.service. Dec 13 13:58:01.259938 systemd[1]: Mounted dev-hugepages.mount. Dec 13 13:58:01.259948 systemd[1]: Mounted dev-mqueue.mount. Dec 13 13:58:01.259959 systemd[1]: Mounted media.mount. Dec 13 13:58:01.259969 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 13:58:01.259979 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 13:58:01.259989 systemd[1]: Mounted tmp.mount. Dec 13 13:58:01.259999 systemd[1]: Finished kmod-static-nodes.service. Dec 13 13:58:01.260010 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 13:58:01.260020 systemd[1]: Finished modprobe@configfs.service. Dec 13 13:58:01.260031 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 13:58:01.260041 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 13:58:01.260051 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 13:58:01.260064 systemd-journald[1002]: Journal started Dec 13 13:58:01.260107 systemd-journald[1002]: Runtime Journal (/run/log/journal/8cc75414b780459889e99299b00bc78d) is 6.0M, max 48.7M, 42.6M free. Dec 13 13:57:59.378000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 13:57:59.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 13:57:59.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 13:57:59.444000 audit: BPF prog-id=10 op=LOAD Dec 13 13:57:59.444000 audit: BPF prog-id=10 op=UNLOAD Dec 13 13:57:59.444000 audit: BPF prog-id=11 op=LOAD Dec 13 13:57:59.444000 audit: BPF prog-id=11 op=UNLOAD Dec 13 13:57:59.480000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 13:57:59.480000 audit[932]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458ac a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:59.480000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 13:57:59.481000 audit[932]: AVC avc: denied { associate } for pid=932 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 13:57:59.481000 audit[932]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145985 a2=1ed a3=0 items=2 ppid=915 pid=932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:59.481000 audit: CWD cwd="/" Dec 13 13:57:59.481000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:57:59.481000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:57:59.481000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 13:58:01.133000 audit: BPF prog-id=12 op=LOAD Dec 13 13:58:01.133000 audit: BPF prog-id=3 op=UNLOAD Dec 13 13:58:01.133000 audit: BPF prog-id=13 op=LOAD Dec 13 13:58:01.134000 audit: BPF prog-id=14 op=LOAD Dec 13 13:58:01.134000 audit: BPF prog-id=4 op=UNLOAD Dec 13 13:58:01.134000 audit: BPF prog-id=5 op=UNLOAD Dec 13 13:58:01.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.155000 audit: BPF prog-id=12 op=UNLOAD Dec 13 13:58:01.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.228000 audit: BPF prog-id=15 op=LOAD Dec 13 13:58:01.229000 audit: BPF prog-id=16 op=LOAD Dec 13 13:58:01.229000 audit: BPF prog-id=17 op=LOAD Dec 13 13:58:01.229000 audit: BPF prog-id=13 op=UNLOAD Dec 13 13:58:01.229000 audit: BPF prog-id=14 op=UNLOAD Dec 13 13:58:01.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.257000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 13:58:01.257000 audit[1002]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=ffffd9173ac0 a2=4000 a3=1 items=0 ppid=1 pid=1002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:01.257000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 13:58:01.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.480146 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:57:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 13:58:01.132152 systemd[1]: Queued start job for default target multi-user.target. Dec 13 13:57:59.480384 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:57:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 13:58:01.132165 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 13:57:59.480402 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:57:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 13:58:01.136304 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 13:57:59.480430 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:57:59Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 13:57:59.480440 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:57:59Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 13:57:59.480468 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:57:59Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 13:58:01.261881 systemd[1]: Finished modprobe@drm.service. Dec 13 13:57:59.480479 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:57:59Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 13:58:01.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.480662 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:57:59Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 13:57:59.480709 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:57:59Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 13:57:59.480721 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:57:59Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 13:57:59.481145 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:57:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 13:57:59.481181 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:57:59Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 13:57:59.481198 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:57:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 13:57:59.481212 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:57:59Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 13:58:01.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:57:59.481227 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:57:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 13:57:59.481241 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:57:59Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 13:58:00.898499 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:58:00Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 13:58:00.898791 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:58:00Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 13:58:00.898896 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:58:00Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 13:58:00.899058 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:58:00Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 13:58:00.899108 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:58:00Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 13:58:00.899163 /usr/lib/systemd/system-generators/torcx-generator[932]: time="2024-12-13T13:58:00Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 13:58:01.263087 systemd[1]: Started systemd-journald.service. Dec 13 13:58:01.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.263843 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 13:58:01.266022 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 13:58:01.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.266966 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 13:58:01.267132 systemd[1]: Finished modprobe@fuse.service. Dec 13 13:58:01.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.267964 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 13:58:01.268465 systemd[1]: Finished modprobe@loop.service. Dec 13 13:58:01.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.269429 systemd[1]: Finished systemd-modules-load.service. Dec 13 13:58:01.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.270690 systemd[1]: Finished systemd-network-generator.service. Dec 13 13:58:01.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.271670 systemd[1]: Finished systemd-remount-fs.service. Dec 13 13:58:01.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.272829 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 13:58:01.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.274053 systemd[1]: Reached target network-pre.target. Dec 13 13:58:01.275969 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 13:58:01.277591 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 13:58:01.278192 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 13:58:01.279970 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 13:58:01.282528 systemd[1]: Starting systemd-journal-flush.service... Dec 13 13:58:01.283351 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 13:58:01.284339 systemd[1]: Starting systemd-random-seed.service... Dec 13 13:58:01.285018 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 13:58:01.286015 systemd[1]: Starting systemd-sysctl.service... Dec 13 13:58:01.287942 systemd[1]: Starting systemd-sysusers.service... Dec 13 13:58:01.290814 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 13:58:01.292540 systemd-journald[1002]: Time spent on flushing to /var/log/journal/8cc75414b780459889e99299b00bc78d is 17.867ms for 973 entries. Dec 13 13:58:01.292540 systemd-journald[1002]: System Journal (/var/log/journal/8cc75414b780459889e99299b00bc78d) is 8.0M, max 195.6M, 187.6M free. Dec 13 13:58:01.324067 systemd-journald[1002]: Received client request to flush runtime journal. Dec 13 13:58:01.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.297221 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 13:58:01.324583 udevadm[1034]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 13:58:01.298175 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 13:58:01.300106 systemd[1]: Starting systemd-udev-settle.service... Dec 13 13:58:01.301643 systemd[1]: Finished systemd-random-seed.service. Dec 13 13:58:01.302567 systemd[1]: Reached target first-boot-complete.target. Dec 13 13:58:01.305372 systemd[1]: Finished systemd-sysctl.service. Dec 13 13:58:01.321144 systemd[1]: Finished systemd-sysusers.service. Dec 13 13:58:01.323257 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 13:58:01.325938 systemd[1]: Finished systemd-journal-flush.service. Dec 13 13:58:01.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.338673 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 13:58:01.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.649438 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 13:58:01.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.650000 audit: BPF prog-id=18 op=LOAD Dec 13 13:58:01.650000 audit: BPF prog-id=19 op=LOAD Dec 13 13:58:01.650000 audit: BPF prog-id=7 op=UNLOAD Dec 13 13:58:01.650000 audit: BPF prog-id=8 op=UNLOAD Dec 13 13:58:01.651581 systemd[1]: Starting systemd-udevd.service... Dec 13 13:58:01.670803 systemd-udevd[1038]: Using default interface naming scheme 'v252'. Dec 13 13:58:01.682481 systemd[1]: Started systemd-udevd.service. Dec 13 13:58:01.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.683000 audit: BPF prog-id=20 op=LOAD Dec 13 13:58:01.684847 systemd[1]: Starting systemd-networkd.service... Dec 13 13:58:01.692000 audit: BPF prog-id=21 op=LOAD Dec 13 13:58:01.692000 audit: BPF prog-id=22 op=LOAD Dec 13 13:58:01.692000 audit: BPF prog-id=23 op=LOAD Dec 13 13:58:01.694350 systemd[1]: Starting systemd-userdbd.service... Dec 13 13:58:01.703905 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Dec 13 13:58:01.727612 systemd[1]: Started systemd-userdbd.service. Dec 13 13:58:01.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.765359 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 13:58:01.782751 systemd-networkd[1045]: lo: Link UP Dec 13 13:58:01.782760 systemd-networkd[1045]: lo: Gained carrier Dec 13 13:58:01.783103 systemd-networkd[1045]: Enumeration completed Dec 13 13:58:01.783202 systemd[1]: Started systemd-networkd.service. Dec 13 13:58:01.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.784288 systemd-networkd[1045]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 13:58:01.785370 systemd-networkd[1045]: eth0: Link UP Dec 13 13:58:01.785381 systemd-networkd[1045]: eth0: Gained carrier Dec 13 13:58:01.793094 systemd[1]: Finished systemd-udev-settle.service. Dec 13 13:58:01.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.794975 systemd[1]: Starting lvm2-activation-early.service... Dec 13 13:58:01.803356 lvm[1071]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 13:58:01.804853 systemd-networkd[1045]: eth0: DHCPv4 address 10.0.0.30/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 13:58:01.831330 systemd[1]: Finished lvm2-activation-early.service. Dec 13 13:58:01.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.832136 systemd[1]: Reached target cryptsetup.target. Dec 13 13:58:01.833852 systemd[1]: Starting lvm2-activation.service... Dec 13 13:58:01.837370 lvm[1072]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 13:58:01.867583 systemd[1]: Finished lvm2-activation.service. Dec 13 13:58:01.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.868327 systemd[1]: Reached target local-fs-pre.target. Dec 13 13:58:01.868951 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 13:58:01.868980 systemd[1]: Reached target local-fs.target. Dec 13 13:58:01.869518 systemd[1]: Reached target machines.target. Dec 13 13:58:01.871178 systemd[1]: Starting ldconfig.service... Dec 13 13:58:01.872039 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 13:58:01.872088 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:58:01.873129 systemd[1]: Starting systemd-boot-update.service... Dec 13 13:58:01.874758 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 13:58:01.876688 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 13:58:01.879317 systemd[1]: Starting systemd-sysext.service... Dec 13 13:58:01.880151 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1074 (bootctl) Dec 13 13:58:01.881343 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 13:58:01.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.886550 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 13:58:01.895554 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 13:58:01.904449 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 13:58:01.904619 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 13:58:01.947594 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 13:58:01.947920 kernel: loop0: detected capacity change from 0 to 194512 Dec 13 13:58:01.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.961741 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 13:58:01.972982 systemd-fsck[1083]: fsck.fat 4.2 (2021-01-31) Dec 13 13:58:01.972982 systemd-fsck[1083]: /dev/vda1: 236 files, 117175/258078 clusters Dec 13 13:58:01.976309 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 13:58:01.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:01.980794 kernel: loop1: detected capacity change from 0 to 194512 Dec 13 13:58:01.984989 (sd-sysext)[1088]: Using extensions 'kubernetes'. Dec 13 13:58:01.985300 (sd-sysext)[1088]: Merged extensions into '/usr'. Dec 13 13:58:02.001567 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 13:58:02.002830 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 13:58:02.004556 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 13:58:02.006344 systemd[1]: Starting modprobe@loop.service... Dec 13 13:58:02.007071 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 13:58:02.007190 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:58:02.007936 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 13:58:02.008056 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 13:58:02.009065 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 13:58:02.009164 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 13:58:02.010154 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 13:58:02.010254 systemd[1]: Finished modprobe@loop.service. Dec 13 13:58:02.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.011210 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 13:58:02.011302 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 13:58:02.049586 ldconfig[1073]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 13:58:02.053465 systemd[1]: Finished ldconfig.service. Dec 13 13:58:02.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.246044 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 13:58:02.247818 systemd[1]: Mounting boot.mount... Dec 13 13:58:02.249487 systemd[1]: Mounting usr-share-oem.mount... Dec 13 13:58:02.255233 systemd[1]: Mounted boot.mount. Dec 13 13:58:02.256013 systemd[1]: Mounted usr-share-oem.mount. Dec 13 13:58:02.257694 systemd[1]: Finished systemd-sysext.service. Dec 13 13:58:02.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.259545 systemd[1]: Starting ensure-sysext.service... Dec 13 13:58:02.261326 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 13:58:02.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.264032 systemd[1]: Finished systemd-boot-update.service. Dec 13 13:58:02.266415 systemd[1]: Reloading. Dec 13 13:58:02.270350 systemd-tmpfiles[1096]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 13:58:02.271066 systemd-tmpfiles[1096]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 13:58:02.272389 systemd-tmpfiles[1096]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 13:58:02.300110 /usr/lib/systemd/system-generators/torcx-generator[1116]: time="2024-12-13T13:58:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 13:58:02.300141 /usr/lib/systemd/system-generators/torcx-generator[1116]: time="2024-12-13T13:58:02Z" level=info msg="torcx already run" Dec 13 13:58:02.354708 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 13:58:02.354738 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 13:58:02.369485 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 13:58:02.408000 audit: BPF prog-id=24 op=LOAD Dec 13 13:58:02.408000 audit: BPF prog-id=15 op=UNLOAD Dec 13 13:58:02.408000 audit: BPF prog-id=25 op=LOAD Dec 13 13:58:02.408000 audit: BPF prog-id=26 op=LOAD Dec 13 13:58:02.408000 audit: BPF prog-id=16 op=UNLOAD Dec 13 13:58:02.408000 audit: BPF prog-id=17 op=UNLOAD Dec 13 13:58:02.409000 audit: BPF prog-id=27 op=LOAD Dec 13 13:58:02.409000 audit: BPF prog-id=21 op=UNLOAD Dec 13 13:58:02.409000 audit: BPF prog-id=28 op=LOAD Dec 13 13:58:02.409000 audit: BPF prog-id=29 op=LOAD Dec 13 13:58:02.409000 audit: BPF prog-id=22 op=UNLOAD Dec 13 13:58:02.409000 audit: BPF prog-id=23 op=UNLOAD Dec 13 13:58:02.409000 audit: BPF prog-id=30 op=LOAD Dec 13 13:58:02.409000 audit: BPF prog-id=31 op=LOAD Dec 13 13:58:02.409000 audit: BPF prog-id=18 op=UNLOAD Dec 13 13:58:02.409000 audit: BPF prog-id=19 op=UNLOAD Dec 13 13:58:02.410000 audit: BPF prog-id=32 op=LOAD Dec 13 13:58:02.410000 audit: BPF prog-id=20 op=UNLOAD Dec 13 13:58:02.414882 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 13:58:02.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.418922 systemd[1]: Starting audit-rules.service... Dec 13 13:58:02.420497 systemd[1]: Starting clean-ca-certificates.service... Dec 13 13:58:02.422436 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 13:58:02.425000 audit: BPF prog-id=33 op=LOAD Dec 13 13:58:02.428910 systemd[1]: Starting systemd-resolved.service... Dec 13 13:58:02.432000 audit: BPF prog-id=34 op=LOAD Dec 13 13:58:02.434360 systemd[1]: Starting systemd-timesyncd.service... Dec 13 13:58:02.436229 systemd[1]: Starting systemd-update-utmp.service... Dec 13 13:58:02.440361 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 13:58:02.440000 audit[1161]: SYSTEM_BOOT pid=1161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.441557 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 13:58:02.443842 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 13:58:02.446103 systemd[1]: Starting modprobe@loop.service... Dec 13 13:58:02.446691 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 13:58:02.446842 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:58:02.447710 systemd[1]: Finished clean-ca-certificates.service. Dec 13 13:58:02.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.448764 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 13:58:02.448876 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 13:58:02.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.449952 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 13:58:02.450064 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 13:58:02.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.451099 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 13:58:02.451200 systemd[1]: Finished modprobe@loop.service. Dec 13 13:58:02.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.453769 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 13:58:02.453918 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 13:58:02.454028 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 13:58:02.456201 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 13:58:02.457463 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 13:58:02.459310 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 13:58:02.460936 systemd[1]: Starting modprobe@loop.service... Dec 13 13:58:02.461538 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 13:58:02.461656 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:58:02.461762 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 13:58:02.462540 systemd[1]: Finished systemd-update-utmp.service. Dec 13 13:58:02.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.463565 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 13:58:02.463680 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 13:58:02.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.464637 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 13:58:02.464766 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 13:58:02.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.465776 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 13:58:02.465889 systemd[1]: Finished modprobe@loop.service. Dec 13 13:58:02.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.469301 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 13:58:02.470390 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 13:58:02.472170 systemd[1]: Starting modprobe@drm.service... Dec 13 13:58:02.473710 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 13:58:02.475588 systemd[1]: Starting modprobe@loop.service... Dec 13 13:58:02.476229 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 13:58:02.476331 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:58:02.478450 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 13:58:02.479335 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 13:58:02.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.480386 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 13:58:02.481496 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 13:58:02.481601 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 13:58:02.482541 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 13:58:02.482642 systemd[1]: Finished modprobe@drm.service. Dec 13 13:58:02.483612 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 13:58:02.483740 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 13:58:02.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.484718 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 13:58:02.484829 systemd[1]: Finished modprobe@loop.service. Dec 13 13:58:02.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.486049 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 13:58:02.486117 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 13:58:02.487192 systemd[1]: Starting systemd-update-done.service... Dec 13 13:58:02.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.488229 systemd[1]: Finished ensure-sysext.service. Dec 13 13:58:02.493185 systemd[1]: Finished systemd-update-done.service. Dec 13 13:58:02.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.498247 systemd[1]: Started systemd-timesyncd.service. Dec 13 13:58:02.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:02.499180 systemd[1]: Reached target time-set.target. Dec 13 13:58:02.499444 systemd-timesyncd[1160]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 13:58:02.499493 systemd-timesyncd[1160]: Initial clock synchronization to Fri 2024-12-13 13:58:02.880213 UTC. Dec 13 13:58:02.501080 systemd-resolved[1159]: Positive Trust Anchors: Dec 13 13:58:02.501091 systemd-resolved[1159]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 13:58:02.501118 systemd-resolved[1159]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 13:58:02.501000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 13:58:02.501000 audit[1188]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffde961380 a2=420 a3=0 items=0 ppid=1155 pid=1188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:02.501000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 13:58:02.502330 augenrules[1188]: No rules Dec 13 13:58:02.503442 systemd[1]: Finished audit-rules.service. Dec 13 13:58:02.510923 systemd-resolved[1159]: Defaulting to hostname 'linux'. Dec 13 13:58:02.512171 systemd[1]: Started systemd-resolved.service. Dec 13 13:58:02.512802 systemd[1]: Reached target network.target. Dec 13 13:58:02.513376 systemd[1]: Reached target nss-lookup.target. Dec 13 13:58:02.513944 systemd[1]: Reached target sysinit.target. Dec 13 13:58:02.514520 systemd[1]: Started motdgen.path. Dec 13 13:58:02.515052 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 13:58:02.515956 systemd[1]: Started logrotate.timer. Dec 13 13:58:02.516536 systemd[1]: Started mdadm.timer. Dec 13 13:58:02.517041 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 13:58:02.517607 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 13:58:02.517635 systemd[1]: Reached target paths.target. Dec 13 13:58:02.518198 systemd[1]: Reached target timers.target. Dec 13 13:58:02.518989 systemd[1]: Listening on dbus.socket. Dec 13 13:58:02.520335 systemd[1]: Starting docker.socket... Dec 13 13:58:02.523259 systemd[1]: Listening on sshd.socket. Dec 13 13:58:02.523950 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:58:02.524351 systemd[1]: Listening on docker.socket. Dec 13 13:58:02.524987 systemd[1]: Reached target sockets.target. Dec 13 13:58:02.525531 systemd[1]: Reached target basic.target. Dec 13 13:58:02.526136 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 13:58:02.526161 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 13:58:02.527050 systemd[1]: Starting containerd.service... Dec 13 13:58:02.528551 systemd[1]: Starting dbus.service... Dec 13 13:58:02.530002 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 13:58:02.531650 systemd[1]: Starting extend-filesystems.service... Dec 13 13:58:02.532400 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 13:58:02.533509 systemd[1]: Starting motdgen.service... Dec 13 13:58:02.535156 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 13:58:02.535832 jq[1197]: false Dec 13 13:58:02.537464 systemd[1]: Starting sshd-keygen.service... Dec 13 13:58:02.540538 systemd[1]: Starting systemd-logind.service... Dec 13 13:58:02.541198 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:58:02.541263 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 13:58:02.541645 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 13:58:02.548128 jq[1208]: true Dec 13 13:58:02.542297 systemd[1]: Starting update-engine.service... Dec 13 13:58:02.543997 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 13:58:02.546186 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 13:58:02.546421 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 13:58:02.549549 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 13:58:02.549695 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 13:58:02.552801 extend-filesystems[1198]: Found loop1 Dec 13 13:58:02.552801 extend-filesystems[1198]: Found vda Dec 13 13:58:02.552801 extend-filesystems[1198]: Found vda1 Dec 13 13:58:02.562382 extend-filesystems[1198]: Found vda2 Dec 13 13:58:02.562382 extend-filesystems[1198]: Found vda3 Dec 13 13:58:02.562382 extend-filesystems[1198]: Found usr Dec 13 13:58:02.562382 extend-filesystems[1198]: Found vda4 Dec 13 13:58:02.562382 extend-filesystems[1198]: Found vda6 Dec 13 13:58:02.562382 extend-filesystems[1198]: Found vda7 Dec 13 13:58:02.562382 extend-filesystems[1198]: Found vda9 Dec 13 13:58:02.562382 extend-filesystems[1198]: Checking size of /dev/vda9 Dec 13 13:58:02.587652 jq[1211]: true Dec 13 13:58:02.573338 dbus-daemon[1196]: [system] SELinux support is enabled Dec 13 13:58:02.569886 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 13:58:02.588051 extend-filesystems[1198]: Resized partition /dev/vda9 Dec 13 13:58:02.570128 systemd[1]: Finished motdgen.service. Dec 13 13:58:02.589017 extend-filesystems[1232]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 13:58:02.573950 systemd[1]: Started dbus.service. Dec 13 13:58:02.577321 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 13:58:02.577340 systemd[1]: Reached target system-config.target. Dec 13 13:58:02.578075 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 13:58:02.578093 systemd[1]: Reached target user-config.target. Dec 13 13:58:02.592077 systemd-logind[1205]: Watching system buttons on /dev/input/event0 (Power Button) Dec 13 13:58:02.593824 systemd-logind[1205]: New seat seat0. Dec 13 13:58:02.594775 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 13:58:02.596653 systemd[1]: Started systemd-logind.service. Dec 13 13:58:02.629756 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 13:58:02.634795 update_engine[1206]: I1213 13:58:02.634528 1206 main.cc:92] Flatcar Update Engine starting Dec 13 13:58:02.648296 update_engine[1206]: I1213 13:58:02.641135 1206 update_check_scheduler.cc:74] Next update check in 2m22s Dec 13 13:58:02.637181 systemd[1]: Started update-engine.service. Dec 13 13:58:02.640119 systemd[1]: Started locksmithd.service. Dec 13 13:58:02.648626 extend-filesystems[1232]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 13:58:02.648626 extend-filesystems[1232]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 13:58:02.648626 extend-filesystems[1232]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 13:58:02.653004 extend-filesystems[1198]: Resized filesystem in /dev/vda9 Dec 13 13:58:02.653641 bash[1244]: Updated "/home/core/.ssh/authorized_keys" Dec 13 13:58:02.649977 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 13:58:02.653842 env[1214]: time="2024-12-13T13:58:02.650022920Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 13:58:02.650144 systemd[1]: Finished extend-filesystems.service. Dec 13 13:58:02.656176 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 13:58:02.672876 env[1214]: time="2024-12-13T13:58:02.672748680Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 13:58:02.672961 env[1214]: time="2024-12-13T13:58:02.672893840Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 13:58:02.674340 env[1214]: time="2024-12-13T13:58:02.674287000Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 13:58:02.674340 env[1214]: time="2024-12-13T13:58:02.674325560Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 13:58:02.674537 env[1214]: time="2024-12-13T13:58:02.674512840Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 13:58:02.674537 env[1214]: time="2024-12-13T13:58:02.674535400Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 13:58:02.674617 env[1214]: time="2024-12-13T13:58:02.674549200Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 13:58:02.674617 env[1214]: time="2024-12-13T13:58:02.674559040Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 13:58:02.674665 env[1214]: time="2024-12-13T13:58:02.674628440Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 13:58:02.674976 env[1214]: time="2024-12-13T13:58:02.674936920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 13:58:02.675088 env[1214]: time="2024-12-13T13:58:02.675067360Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 13:58:02.675127 env[1214]: time="2024-12-13T13:58:02.675087320Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 13:58:02.675150 env[1214]: time="2024-12-13T13:58:02.675139000Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 13:58:02.675179 env[1214]: time="2024-12-13T13:58:02.675151520Z" level=info msg="metadata content store policy set" policy=shared Dec 13 13:58:02.679234 env[1214]: time="2024-12-13T13:58:02.679196760Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 13:58:02.679234 env[1214]: time="2024-12-13T13:58:02.679231240Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 13:58:02.679310 env[1214]: time="2024-12-13T13:58:02.679244040Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 13:58:02.679310 env[1214]: time="2024-12-13T13:58:02.679280800Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 13:58:02.679310 env[1214]: time="2024-12-13T13:58:02.679296000Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 13:58:02.679310 env[1214]: time="2024-12-13T13:58:02.679309200Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 13:58:02.679382 env[1214]: time="2024-12-13T13:58:02.679321480Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 13:58:02.679658 locksmithd[1245]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 13:58:02.679883 env[1214]: time="2024-12-13T13:58:02.679804040Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 13:58:02.679883 env[1214]: time="2024-12-13T13:58:02.679831480Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 13:58:02.679883 env[1214]: time="2024-12-13T13:58:02.679844760Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 13:58:02.679883 env[1214]: time="2024-12-13T13:58:02.679857440Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 13:58:02.679883 env[1214]: time="2024-12-13T13:58:02.679870800Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 13:58:02.680005 env[1214]: time="2024-12-13T13:58:02.679982560Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 13:58:02.680076 env[1214]: time="2024-12-13T13:58:02.680062440Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 13:58:02.681755 env[1214]: time="2024-12-13T13:58:02.680309760Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 13:58:02.681755 env[1214]: time="2024-12-13T13:58:02.680352440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 13:58:02.681755 env[1214]: time="2024-12-13T13:58:02.680382800Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 13:58:02.681755 env[1214]: time="2024-12-13T13:58:02.680495000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 13:58:02.681755 env[1214]: time="2024-12-13T13:58:02.680510480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 13:58:02.681755 env[1214]: time="2024-12-13T13:58:02.680522360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 13:58:02.681755 env[1214]: time="2024-12-13T13:58:02.680533160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 13:58:02.681755 env[1214]: time="2024-12-13T13:58:02.680544760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 13:58:02.681755 env[1214]: time="2024-12-13T13:58:02.680556680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 13:58:02.681755 env[1214]: time="2024-12-13T13:58:02.680581040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 13:58:02.681755 env[1214]: time="2024-12-13T13:58:02.680593840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 13:58:02.681755 env[1214]: time="2024-12-13T13:58:02.680607680Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 13:58:02.681755 env[1214]: time="2024-12-13T13:58:02.680760480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 13:58:02.681755 env[1214]: time="2024-12-13T13:58:02.680778520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 13:58:02.681755 env[1214]: time="2024-12-13T13:58:02.680790520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 13:58:02.682081 env[1214]: time="2024-12-13T13:58:02.680802440Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 13:58:02.682081 env[1214]: time="2024-12-13T13:58:02.680816440Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 13:58:02.682081 env[1214]: time="2024-12-13T13:58:02.680829920Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 13:58:02.682081 env[1214]: time="2024-12-13T13:58:02.680846560Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 13:58:02.682081 env[1214]: time="2024-12-13T13:58:02.680878800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 13:58:02.682177 env[1214]: time="2024-12-13T13:58:02.681055000Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 13:58:02.682177 env[1214]: time="2024-12-13T13:58:02.681104000Z" level=info msg="Connect containerd service" Dec 13 13:58:02.682177 env[1214]: time="2024-12-13T13:58:02.681133200Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 13:58:02.682177 env[1214]: time="2024-12-13T13:58:02.681805720Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 13:58:02.682177 env[1214]: time="2024-12-13T13:58:02.681919880Z" level=info msg="Start subscribing containerd event" Dec 13 13:58:02.682177 env[1214]: time="2024-12-13T13:58:02.681956720Z" level=info msg="Start recovering state" Dec 13 13:58:02.682177 env[1214]: time="2024-12-13T13:58:02.682010720Z" level=info msg="Start event monitor" Dec 13 13:58:02.682177 env[1214]: time="2024-12-13T13:58:02.682029680Z" level=info msg="Start snapshots syncer" Dec 13 13:58:02.682177 env[1214]: time="2024-12-13T13:58:02.682038120Z" level=info msg="Start cni network conf syncer for default" Dec 13 13:58:02.682177 env[1214]: time="2024-12-13T13:58:02.682044880Z" level=info msg="Start streaming server" Dec 13 13:58:02.682924 env[1214]: time="2024-12-13T13:58:02.682376240Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 13:58:02.682924 env[1214]: time="2024-12-13T13:58:02.682413280Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 13:58:02.682559 systemd[1]: Started containerd.service. Dec 13 13:58:02.683686 env[1214]: time="2024-12-13T13:58:02.683646240Z" level=info msg="containerd successfully booted in 0.034460s" Dec 13 13:58:03.388124 systemd-networkd[1045]: eth0: Gained IPv6LL Dec 13 13:58:03.389832 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 13:58:03.390866 systemd[1]: Reached target network-online.target. Dec 13 13:58:03.393005 systemd[1]: Starting kubelet.service... Dec 13 13:58:03.893766 systemd[1]: Started kubelet.service. Dec 13 13:58:04.101708 sshd_keygen[1219]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 13:58:04.121474 systemd[1]: Finished sshd-keygen.service. Dec 13 13:58:04.123693 systemd[1]: Starting issuegen.service... Dec 13 13:58:04.128701 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 13:58:04.128873 systemd[1]: Finished issuegen.service. Dec 13 13:58:04.130868 systemd[1]: Starting systemd-user-sessions.service... Dec 13 13:58:04.137497 systemd[1]: Finished systemd-user-sessions.service. Dec 13 13:58:04.139597 systemd[1]: Started getty@tty1.service. Dec 13 13:58:04.141608 systemd[1]: Started serial-getty@ttyAMA0.service. Dec 13 13:58:04.142508 systemd[1]: Reached target getty.target. Dec 13 13:58:04.143262 systemd[1]: Reached target multi-user.target. Dec 13 13:58:04.145288 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 13:58:04.152641 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 13:58:04.152835 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 13:58:04.153804 systemd[1]: Startup finished in 605ms (kernel) + 3.769s (initrd) + 4.807s (userspace) = 9.182s. Dec 13 13:58:04.437985 kubelet[1260]: E1213 13:58:04.437864 1260 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 13:58:04.440354 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 13:58:04.440480 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 13:58:08.535356 systemd[1]: Created slice system-sshd.slice. Dec 13 13:58:08.536459 systemd[1]: Started sshd@0-10.0.0.30:22-10.0.0.1:50558.service. Dec 13 13:58:08.586284 sshd[1283]: Accepted publickey for core from 10.0.0.1 port 50558 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:08.588656 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:08.598852 systemd-logind[1205]: New session 1 of user core. Dec 13 13:58:08.599829 systemd[1]: Created slice user-500.slice. Dec 13 13:58:08.601084 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 13:58:08.611106 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 13:58:08.612734 systemd[1]: Starting user@500.service... Dec 13 13:58:08.619869 (systemd)[1286]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:08.693921 systemd[1286]: Queued start job for default target default.target. Dec 13 13:58:08.694439 systemd[1286]: Reached target paths.target. Dec 13 13:58:08.694459 systemd[1286]: Reached target sockets.target. Dec 13 13:58:08.694472 systemd[1286]: Reached target timers.target. Dec 13 13:58:08.694483 systemd[1286]: Reached target basic.target. Dec 13 13:58:08.694535 systemd[1286]: Reached target default.target. Dec 13 13:58:08.694566 systemd[1286]: Startup finished in 68ms. Dec 13 13:58:08.694618 systemd[1]: Started user@500.service. Dec 13 13:58:08.695596 systemd[1]: Started session-1.scope. Dec 13 13:58:08.753968 systemd[1]: Started sshd@1-10.0.0.30:22-10.0.0.1:50574.service. Dec 13 13:58:08.793095 sshd[1295]: Accepted publickey for core from 10.0.0.1 port 50574 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:08.794553 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:08.802892 systemd-logind[1205]: New session 2 of user core. Dec 13 13:58:08.804069 systemd[1]: Started session-2.scope. Dec 13 13:58:08.863312 sshd[1295]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:08.866569 systemd[1]: sshd@1-10.0.0.30:22-10.0.0.1:50574.service: Deactivated successfully. Dec 13 13:58:08.867141 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 13:58:08.868342 systemd-logind[1205]: Session 2 logged out. Waiting for processes to exit. Dec 13 13:58:08.869317 systemd[1]: Started sshd@2-10.0.0.30:22-10.0.0.1:50588.service. Dec 13 13:58:08.870110 systemd-logind[1205]: Removed session 2. Dec 13 13:58:08.904997 sshd[1301]: Accepted publickey for core from 10.0.0.1 port 50588 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:08.906164 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:08.909531 systemd-logind[1205]: New session 3 of user core. Dec 13 13:58:08.910262 systemd[1]: Started session-3.scope. Dec 13 13:58:08.961013 sshd[1301]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:08.964487 systemd[1]: sshd@2-10.0.0.30:22-10.0.0.1:50588.service: Deactivated successfully. Dec 13 13:58:08.965026 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 13:58:08.965584 systemd-logind[1205]: Session 3 logged out. Waiting for processes to exit. Dec 13 13:58:08.966556 systemd[1]: Started sshd@3-10.0.0.30:22-10.0.0.1:50602.service. Dec 13 13:58:08.971082 systemd-logind[1205]: Removed session 3. Dec 13 13:58:09.002182 sshd[1308]: Accepted publickey for core from 10.0.0.1 port 50602 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:09.003335 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:09.006613 systemd-logind[1205]: New session 4 of user core. Dec 13 13:58:09.007338 systemd[1]: Started session-4.scope. Dec 13 13:58:09.064106 sshd[1308]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:09.068097 systemd[1]: sshd@3-10.0.0.30:22-10.0.0.1:50602.service: Deactivated successfully. Dec 13 13:58:09.068618 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 13:58:09.069127 systemd-logind[1205]: Session 4 logged out. Waiting for processes to exit. Dec 13 13:58:09.070111 systemd[1]: Started sshd@4-10.0.0.30:22-10.0.0.1:50606.service. Dec 13 13:58:09.070713 systemd-logind[1205]: Removed session 4. Dec 13 13:58:09.109987 sshd[1314]: Accepted publickey for core from 10.0.0.1 port 50606 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:09.111124 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:09.114281 systemd-logind[1205]: New session 5 of user core. Dec 13 13:58:09.115052 systemd[1]: Started session-5.scope. Dec 13 13:58:09.178105 sudo[1317]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 13:58:09.178609 sudo[1317]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 13:58:09.192941 dbus-daemon[1196]: avc: received setenforce notice (enforcing=1) Dec 13 13:58:09.194698 sudo[1317]: pam_unix(sudo:session): session closed for user root Dec 13 13:58:09.196632 sshd[1314]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:09.199310 systemd[1]: sshd@4-10.0.0.30:22-10.0.0.1:50606.service: Deactivated successfully. Dec 13 13:58:09.199894 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 13:58:09.200416 systemd-logind[1205]: Session 5 logged out. Waiting for processes to exit. Dec 13 13:58:09.201426 systemd[1]: Started sshd@5-10.0.0.30:22-10.0.0.1:50614.service. Dec 13 13:58:09.202222 systemd-logind[1205]: Removed session 5. Dec 13 13:58:09.240015 sshd[1321]: Accepted publickey for core from 10.0.0.1 port 50614 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:09.241512 sshd[1321]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:09.244593 systemd-logind[1205]: New session 6 of user core. Dec 13 13:58:09.245391 systemd[1]: Started session-6.scope. Dec 13 13:58:09.297853 sudo[1325]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 13:58:09.298348 sudo[1325]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 13:58:09.301174 sudo[1325]: pam_unix(sudo:session): session closed for user root Dec 13 13:58:09.305288 sudo[1324]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 13:58:09.305504 sudo[1324]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 13:58:09.313506 systemd[1]: Stopping audit-rules.service... Dec 13 13:58:09.315000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 13:58:09.317376 kernel: kauditd_printk_skb: 117 callbacks suppressed Dec 13 13:58:09.317430 kernel: audit: type=1305 audit(1734098289.315:206): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 13:58:09.317447 auditctl[1328]: No rules Dec 13 13:58:09.317374 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 13:58:09.317532 systemd[1]: Stopped audit-rules.service. Dec 13 13:58:09.315000 audit[1328]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdcd4c8f0 a2=420 a3=0 items=0 ppid=1 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:09.319001 systemd[1]: Starting audit-rules.service... Dec 13 13:58:09.321054 kernel: audit: type=1300 audit(1734098289.315:206): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdcd4c8f0 a2=420 a3=0 items=0 ppid=1 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:09.321107 kernel: audit: type=1327 audit(1734098289.315:206): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 13:58:09.315000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 13:58:09.322012 kernel: audit: type=1131 audit(1734098289.316:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:09.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:09.334688 augenrules[1345]: No rules Dec 13 13:58:09.335298 systemd[1]: Finished audit-rules.service. Dec 13 13:58:09.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:09.336000 audit[1324]: USER_END pid=1324 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:58:09.336953 sudo[1324]: pam_unix(sudo:session): session closed for user root Dec 13 13:58:09.339535 kernel: audit: type=1130 audit(1734098289.334:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:09.339572 kernel: audit: type=1106 audit(1734098289.336:209): pid=1324 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:58:09.336000 audit[1324]: CRED_DISP pid=1324 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:58:09.341917 kernel: audit: type=1104 audit(1734098289.336:210): pid=1324 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:58:09.342287 sshd[1321]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:09.341000 audit[1321]: USER_END pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:09.345633 systemd[1]: sshd@5-10.0.0.30:22-10.0.0.1:50614.service: Deactivated successfully. Dec 13 13:58:09.341000 audit[1321]: CRED_DISP pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:09.346164 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 13:58:09.347737 systemd[1]: Started sshd@6-10.0.0.30:22-10.0.0.1:50628.service. Dec 13 13:58:09.348341 kernel: audit: type=1106 audit(1734098289.341:211): pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:09.348384 kernel: audit: type=1104 audit(1734098289.341:212): pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:09.348402 kernel: audit: type=1131 audit(1734098289.341:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.30:22-10.0.0.1:50614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:09.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.30:22-10.0.0.1:50614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:09.348806 systemd-logind[1205]: Session 6 logged out. Waiting for processes to exit. Dec 13 13:58:09.349828 systemd-logind[1205]: Removed session 6. Dec 13 13:58:09.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.30:22-10.0.0.1:50628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:09.381000 audit[1351]: USER_ACCT pid=1351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:09.382882 sshd[1351]: Accepted publickey for core from 10.0.0.1 port 50628 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:58:09.383000 audit[1351]: CRED_ACQ pid=1351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:09.383000 audit[1351]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8ddd310 a2=3 a3=1 items=0 ppid=1 pid=1351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:09.383000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:58:09.384243 sshd[1351]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:58:09.387702 systemd-logind[1205]: New session 7 of user core. Dec 13 13:58:09.388116 systemd[1]: Started session-7.scope. Dec 13 13:58:09.390000 audit[1351]: USER_START pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:09.391000 audit[1354]: CRED_ACQ pid=1354 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:09.440000 audit[1355]: USER_ACCT pid=1355 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:58:09.442078 sudo[1355]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 13:58:09.442309 sudo[1355]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 13:58:09.440000 audit[1355]: CRED_REFR pid=1355 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:58:09.443000 audit[1355]: USER_START pid=1355 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:58:09.455015 systemd[1]: Starting coreos-metadata.service... Dec 13 13:58:09.461019 systemd[1]: coreos-metadata.service: Deactivated successfully. Dec 13 13:58:09.461173 systemd[1]: Finished coreos-metadata.service. Dec 13 13:58:09.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:09.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:09.968077 systemd[1]: Stopped kubelet.service. Dec 13 13:58:09.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:09.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:09.970126 systemd[1]: Starting kubelet.service... Dec 13 13:58:09.984527 systemd[1]: Reloading. Dec 13 13:58:10.046111 /usr/lib/systemd/system-generators/torcx-generator[1419]: time="2024-12-13T13:58:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 13:58:10.046386 /usr/lib/systemd/system-generators/torcx-generator[1419]: time="2024-12-13T13:58:10Z" level=info msg="torcx already run" Dec 13 13:58:10.197594 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 13:58:10.197614 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 13:58:10.212773 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 13:58:10.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit: BPF prog-id=40 op=LOAD Dec 13 13:58:10.263000 audit: BPF prog-id=24 op=UNLOAD Dec 13 13:58:10.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit: BPF prog-id=41 op=LOAD Dec 13 13:58:10.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.263000 audit: BPF prog-id=42 op=LOAD Dec 13 13:58:10.263000 audit: BPF prog-id=25 op=UNLOAD Dec 13 13:58:10.263000 audit: BPF prog-id=26 op=UNLOAD Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit: BPF prog-id=43 op=LOAD Dec 13 13:58:10.264000 audit: BPF prog-id=27 op=UNLOAD Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit: BPF prog-id=44 op=LOAD Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.264000 audit: BPF prog-id=45 op=LOAD Dec 13 13:58:10.264000 audit: BPF prog-id=28 op=UNLOAD Dec 13 13:58:10.264000 audit: BPF prog-id=29 op=UNLOAD Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit: BPF prog-id=46 op=LOAD Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit: BPF prog-id=47 op=LOAD Dec 13 13:58:10.265000 audit: BPF prog-id=30 op=UNLOAD Dec 13 13:58:10.265000 audit: BPF prog-id=31 op=UNLOAD Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.265000 audit: BPF prog-id=48 op=LOAD Dec 13 13:58:10.265000 audit: BPF prog-id=32 op=UNLOAD Dec 13 13:58:10.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.266000 audit: BPF prog-id=49 op=LOAD Dec 13 13:58:10.266000 audit: BPF prog-id=33 op=UNLOAD Dec 13 13:58:10.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.267000 audit: BPF prog-id=50 op=LOAD Dec 13 13:58:10.267000 audit: BPF prog-id=34 op=UNLOAD Dec 13 13:58:10.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.269000 audit: BPF prog-id=51 op=LOAD Dec 13 13:58:10.269000 audit: BPF prog-id=38 op=UNLOAD Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit: BPF prog-id=52 op=LOAD Dec 13 13:58:10.270000 audit: BPF prog-id=35 op=UNLOAD Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit: BPF prog-id=53 op=LOAD Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:10.270000 audit: BPF prog-id=54 op=LOAD Dec 13 13:58:10.270000 audit: BPF prog-id=36 op=UNLOAD Dec 13 13:58:10.270000 audit: BPF prog-id=37 op=UNLOAD Dec 13 13:58:10.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:10.282058 systemd[1]: Started kubelet.service. Dec 13 13:58:10.284173 systemd[1]: Stopping kubelet.service... Dec 13 13:58:10.284569 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 13:58:10.284763 systemd[1]: Stopped kubelet.service. Dec 13 13:58:10.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:10.286422 systemd[1]: Starting kubelet.service... Dec 13 13:58:10.364517 systemd[1]: Started kubelet.service. Dec 13 13:58:10.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:10.401286 kubelet[1464]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 13:58:10.401558 kubelet[1464]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 13:58:10.401604 kubelet[1464]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 13:58:10.401734 kubelet[1464]: I1213 13:58:10.401698 1464 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 13:58:10.989390 kubelet[1464]: I1213 13:58:10.989339 1464 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 13:58:10.989390 kubelet[1464]: I1213 13:58:10.989374 1464 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 13:58:10.989627 kubelet[1464]: I1213 13:58:10.989598 1464 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 13:58:11.031157 kubelet[1464]: I1213 13:58:11.031115 1464 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 13:58:11.046120 kubelet[1464]: I1213 13:58:11.045984 1464 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 13:58:11.047327 kubelet[1464]: I1213 13:58:11.047282 1464 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 13:58:11.047535 kubelet[1464]: I1213 13:58:11.047482 1464 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 13:58:11.047535 kubelet[1464]: I1213 13:58:11.047506 1464 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 13:58:11.047535 kubelet[1464]: I1213 13:58:11.047515 1464 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 13:58:11.048857 kubelet[1464]: I1213 13:58:11.048753 1464 state_mem.go:36] "Initialized new in-memory state store" Dec 13 13:58:11.051342 kubelet[1464]: I1213 13:58:11.051319 1464 kubelet.go:396] "Attempting to sync node with API server" Dec 13 13:58:11.051342 kubelet[1464]: I1213 13:58:11.051348 1464 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 13:58:11.051549 kubelet[1464]: I1213 13:58:11.051371 1464 kubelet.go:312] "Adding apiserver pod source" Dec 13 13:58:11.051549 kubelet[1464]: I1213 13:58:11.051390 1464 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 13:58:11.052161 kubelet[1464]: E1213 13:58:11.052130 1464 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:11.052223 kubelet[1464]: E1213 13:58:11.052190 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:11.052275 kubelet[1464]: I1213 13:58:11.052248 1464 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 13:58:11.052796 kubelet[1464]: I1213 13:58:11.052781 1464 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 13:58:11.053811 kubelet[1464]: W1213 13:58:11.053781 1464 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 13:58:11.054593 kubelet[1464]: I1213 13:58:11.054563 1464 server.go:1256] "Started kubelet" Dec 13 13:58:11.055544 kubelet[1464]: I1213 13:58:11.055312 1464 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 13:58:11.060331 kubelet[1464]: I1213 13:58:11.060297 1464 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 13:58:11.060401 kubelet[1464]: I1213 13:58:11.060366 1464 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 13:58:11.058000 audit[1464]: AVC avc: denied { mac_admin } for pid=1464 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.058000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 13:58:11.058000 audit[1464]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000dd2d20 a1=4000da0d20 a2=4000dd2cf0 a3=25 items=0 ppid=1 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.058000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 13:58:11.061009 kubelet[1464]: I1213 13:58:11.060992 1464 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 13:58:11.059000 audit[1464]: AVC avc: denied { mac_admin } for pid=1464 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.059000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 13:58:11.059000 audit[1464]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007dcf60 a1=4000da0d38 a2=4000dd2db0 a3=25 items=0 ppid=1 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.059000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 13:58:11.061310 kubelet[1464]: I1213 13:58:11.061296 1464 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 13:58:11.062120 kubelet[1464]: I1213 13:58:11.062096 1464 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 13:58:11.065124 kubelet[1464]: I1213 13:58:11.065103 1464 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 13:58:11.065461 kubelet[1464]: E1213 13:58:11.065435 1464 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 13:58:11.065682 kubelet[1464]: I1213 13:58:11.065642 1464 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 13:58:11.065840 kubelet[1464]: I1213 13:58:11.065815 1464 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 13:58:11.065930 kubelet[1464]: I1213 13:58:11.065908 1464 server.go:461] "Adding debug handlers to kubelet server" Dec 13 13:58:11.067040 kubelet[1464]: I1213 13:58:11.067015 1464 factory.go:221] Registration of the systemd container factory successfully Dec 13 13:58:11.068250 kubelet[1464]: W1213 13:58:11.068223 1464 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 13:58:11.068250 kubelet[1464]: E1213 13:58:11.068255 1464 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 13:58:11.068459 kubelet[1464]: W1213 13:58:11.068439 1464 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: nodes "10.0.0.30" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 13:58:11.068528 kubelet[1464]: E1213 13:58:11.068519 1464 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.30" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 13:58:11.069008 kubelet[1464]: I1213 13:58:11.068914 1464 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 13:58:11.071224 kubelet[1464]: E1213 13:58:11.071195 1464 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.30\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 13:58:11.071320 kubelet[1464]: W1213 13:58:11.071287 1464 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 13:58:11.071320 kubelet[1464]: E1213 13:58:11.071305 1464 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 13:58:11.071435 kubelet[1464]: E1213 13:58:11.071409 1464 event.go:346] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.30.1810c13543eb038a default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.30,UID:10.0.0.30,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.0.0.30,},FirstTimestamp:2024-12-13 13:58:11.054543754 +0000 UTC m=+0.686486252,LastTimestamp:2024-12-13 13:58:11.054543754 +0000 UTC m=+0.686486252,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.30,}" Dec 13 13:58:11.078621 kubelet[1464]: I1213 13:58:11.073730 1464 factory.go:221] Registration of the containerd container factory successfully Dec 13 13:58:11.084103 kubelet[1464]: I1213 13:58:11.084073 1464 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 13:58:11.084103 kubelet[1464]: I1213 13:58:11.084100 1464 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 13:58:11.084223 kubelet[1464]: I1213 13:58:11.084117 1464 state_mem.go:36] "Initialized new in-memory state store" Dec 13 13:58:11.149145 kubelet[1464]: I1213 13:58:11.149099 1464 policy_none.go:49] "None policy: Start" Dec 13 13:58:11.149964 kubelet[1464]: I1213 13:58:11.149944 1464 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 13:58:11.150051 kubelet[1464]: I1213 13:58:11.149987 1464 state_mem.go:35] "Initializing new in-memory state store" Dec 13 13:58:11.153000 audit[1480]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:11.153000 audit[1480]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc984a760 a2=0 a3=1 items=0 ppid=1464 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.153000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 13:58:11.155000 audit[1483]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:11.155000 audit[1483]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffd281f7d0 a2=0 a3=1 items=0 ppid=1464 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.155000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 13:58:11.158895 systemd[1]: Created slice kubepods.slice. Dec 13 13:58:11.164474 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 13:58:11.167802 kubelet[1464]: I1213 13:58:11.167595 1464 kubelet_node_status.go:73] "Attempting to register node" node="10.0.0.30" Dec 13 13:58:11.168671 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 13:58:11.175149 kubelet[1464]: I1213 13:58:11.175122 1464 kubelet_node_status.go:76] "Successfully registered node" node="10.0.0.30" Dec 13 13:58:11.180597 kubelet[1464]: I1213 13:58:11.180577 1464 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 13:58:11.178000 audit[1464]: AVC avc: denied { mac_admin } for pid=1464 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:11.178000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 13:58:11.178000 audit[1464]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f258f0 a1=4000f21d88 a2=4000f258c0 a3=25 items=0 ppid=1 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.178000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 13:58:11.157000 audit[1485]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:11.157000 audit[1485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd0fd1330 a2=0 a3=1 items=0 ppid=1464 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 13:58:11.180974 kubelet[1464]: I1213 13:58:11.180642 1464 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 13:58:11.181119 kubelet[1464]: I1213 13:58:11.181093 1464 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 13:58:11.182000 audit[1490]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:11.182000 audit[1490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff608cc30 a2=0 a3=1 items=0 ppid=1464 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.182000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 13:58:11.183853 kubelet[1464]: E1213 13:58:11.183651 1464 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.30\" not found" Dec 13 13:58:11.188157 kubelet[1464]: E1213 13:58:11.188130 1464 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.30\" not found" Dec 13 13:58:11.220000 audit[1495]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1495 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:11.220000 audit[1495]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff5a92790 a2=0 a3=1 items=0 ppid=1464 pid=1495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 13:58:11.221404 kubelet[1464]: I1213 13:58:11.221211 1464 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 13:58:11.221000 audit[1496]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1496 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:11.221000 audit[1496]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe0c3fe50 a2=0 a3=1 items=0 ppid=1464 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.221000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 13:58:11.222279 kubelet[1464]: I1213 13:58:11.222262 1464 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 13:58:11.222358 kubelet[1464]: I1213 13:58:11.222348 1464 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 13:58:11.222429 kubelet[1464]: I1213 13:58:11.222420 1464 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 13:58:11.222607 kubelet[1464]: E1213 13:58:11.222597 1464 kubelet.go:2353] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 13:58:11.223000 audit[1497]: NETFILTER_CFG table=mangle:8 family=10 entries=1 op=nft_register_chain pid=1497 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:11.223000 audit[1497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe7fc7bf0 a2=0 a3=1 items=0 ppid=1464 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 13:58:11.224000 audit[1498]: NETFILTER_CFG table=mangle:9 family=2 entries=1 op=nft_register_chain pid=1498 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:11.224000 audit[1498]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffffb24490 a2=0 a3=1 items=0 ppid=1464 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.224000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 13:58:11.225000 audit[1499]: NETFILTER_CFG table=nat:10 family=10 entries=2 op=nft_register_chain pid=1499 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:11.225000 audit[1499]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffdeb421f0 a2=0 a3=1 items=0 ppid=1464 pid=1499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.225000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 13:58:11.225000 audit[1500]: NETFILTER_CFG table=nat:11 family=2 entries=2 op=nft_register_chain pid=1500 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:11.225000 audit[1500]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe38b55f0 a2=0 a3=1 items=0 ppid=1464 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.225000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 13:58:11.226000 audit[1501]: NETFILTER_CFG table=filter:12 family=10 entries=2 op=nft_register_chain pid=1501 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:11.226000 audit[1501]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff5d6e230 a2=0 a3=1 items=0 ppid=1464 pid=1501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.226000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 13:58:11.226000 audit[1502]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1502 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:11.226000 audit[1502]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcb82f780 a2=0 a3=1 items=0 ppid=1464 pid=1502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:11.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 13:58:11.288921 kubelet[1464]: E1213 13:58:11.288832 1464 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.30\" not found" Dec 13 13:58:11.389179 kubelet[1464]: E1213 13:58:11.389141 1464 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.30\" not found" Dec 13 13:58:11.489278 kubelet[1464]: E1213 13:58:11.489230 1464 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.30\" not found" Dec 13 13:58:11.590377 kubelet[1464]: E1213 13:58:11.590238 1464 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.30\" not found" Dec 13 13:58:11.691455 kubelet[1464]: E1213 13:58:11.691376 1464 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.30\" not found" Dec 13 13:58:11.792405 kubelet[1464]: E1213 13:58:11.792333 1464 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.30\" not found" Dec 13 13:58:11.892000 audit[1355]: USER_END pid=1355 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:58:11.892000 audit[1355]: CRED_DISP pid=1355 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:58:11.893438 kubelet[1464]: E1213 13:58:11.892475 1464 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.30\" not found" Dec 13 13:58:11.892837 sudo[1355]: pam_unix(sudo:session): session closed for user root Dec 13 13:58:11.894575 sshd[1351]: pam_unix(sshd:session): session closed for user core Dec 13 13:58:11.895000 audit[1351]: USER_END pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:11.895000 audit[1351]: CRED_DISP pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:58:11.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.30:22-10.0.0.1:50628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:58:11.897529 systemd[1]: sshd@6-10.0.0.30:22-10.0.0.1:50628.service: Deactivated successfully. Dec 13 13:58:11.898240 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 13:58:11.898780 systemd-logind[1205]: Session 7 logged out. Waiting for processes to exit. Dec 13 13:58:11.900179 systemd-logind[1205]: Removed session 7. Dec 13 13:58:11.991772 kubelet[1464]: I1213 13:58:11.991716 1464 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 13:58:11.992099 kubelet[1464]: W1213 13:58:11.992082 1464 reflector.go:462] vendor/k8s.io/client-go/informers/factory.go:159: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:159: Unexpected watch close - watch lasted less than a second and no items received Dec 13 13:58:11.993052 kubelet[1464]: E1213 13:58:11.993029 1464 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.30\" not found" Dec 13 13:58:12.053235 kubelet[1464]: E1213 13:58:12.053194 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:12.093650 kubelet[1464]: E1213 13:58:12.093610 1464 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.30\" not found" Dec 13 13:58:12.195057 kubelet[1464]: I1213 13:58:12.194955 1464 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 13:58:12.196611 env[1214]: time="2024-12-13T13:58:12.196556876Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 13:58:12.196875 kubelet[1464]: I1213 13:58:12.196823 1464 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 13:58:13.053797 kubelet[1464]: E1213 13:58:13.053739 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:13.054244 kubelet[1464]: I1213 13:58:13.054228 1464 apiserver.go:52] "Watching apiserver" Dec 13 13:58:13.058200 kubelet[1464]: I1213 13:58:13.058174 1464 topology_manager.go:215] "Topology Admit Handler" podUID="56e4c3a9-af29-4d6e-8b5f-b6728d754f2d" podNamespace="calico-system" podName="calico-node-mxdhc" Dec 13 13:58:13.058400 kubelet[1464]: I1213 13:58:13.058384 1464 topology_manager.go:215] "Topology Admit Handler" podUID="c6e23b73-823d-4a32-93af-7220cd7c628d" podNamespace="calico-system" podName="csi-node-driver-9f685" Dec 13 13:58:13.058566 kubelet[1464]: I1213 13:58:13.058551 1464 topology_manager.go:215] "Topology Admit Handler" podUID="34b901f0-6f84-4b64-a266-ef37d4fd6b0a" podNamespace="kube-system" podName="kube-proxy-7c4qf" Dec 13 13:58:13.059001 kubelet[1464]: E1213 13:58:13.058896 1464 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9f685" podUID="c6e23b73-823d-4a32-93af-7220cd7c628d" Dec 13 13:58:13.065602 systemd[1]: Created slice kubepods-besteffort-pod56e4c3a9_af29_4d6e_8b5f_b6728d754f2d.slice. Dec 13 13:58:13.068470 kubelet[1464]: I1213 13:58:13.068429 1464 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 13:58:13.075812 kubelet[1464]: I1213 13:58:13.075695 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/56e4c3a9-af29-4d6e-8b5f-b6728d754f2d-var-run-calico\") pod \"calico-node-mxdhc\" (UID: \"56e4c3a9-af29-4d6e-8b5f-b6728d754f2d\") " pod="calico-system/calico-node-mxdhc" Dec 13 13:58:13.075812 kubelet[1464]: I1213 13:58:13.075745 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/56e4c3a9-af29-4d6e-8b5f-b6728d754f2d-cni-bin-dir\") pod \"calico-node-mxdhc\" (UID: \"56e4c3a9-af29-4d6e-8b5f-b6728d754f2d\") " pod="calico-system/calico-node-mxdhc" Dec 13 13:58:13.075812 kubelet[1464]: I1213 13:58:13.075768 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/56e4c3a9-af29-4d6e-8b5f-b6728d754f2d-cni-log-dir\") pod \"calico-node-mxdhc\" (UID: \"56e4c3a9-af29-4d6e-8b5f-b6728d754f2d\") " pod="calico-system/calico-node-mxdhc" Dec 13 13:58:13.075812 kubelet[1464]: I1213 13:58:13.075788 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/56e4c3a9-af29-4d6e-8b5f-b6728d754f2d-flexvol-driver-host\") pod \"calico-node-mxdhc\" (UID: \"56e4c3a9-af29-4d6e-8b5f-b6728d754f2d\") " pod="calico-system/calico-node-mxdhc" Dec 13 13:58:13.075812 kubelet[1464]: I1213 13:58:13.075808 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/c6e23b73-823d-4a32-93af-7220cd7c628d-varrun\") pod \"csi-node-driver-9f685\" (UID: \"c6e23b73-823d-4a32-93af-7220cd7c628d\") " pod="calico-system/csi-node-driver-9f685" Dec 13 13:58:13.075999 kubelet[1464]: I1213 13:58:13.075826 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/34b901f0-6f84-4b64-a266-ef37d4fd6b0a-xtables-lock\") pod \"kube-proxy-7c4qf\" (UID: \"34b901f0-6f84-4b64-a266-ef37d4fd6b0a\") " pod="kube-system/kube-proxy-7c4qf" Dec 13 13:58:13.075999 kubelet[1464]: I1213 13:58:13.075867 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/56e4c3a9-af29-4d6e-8b5f-b6728d754f2d-tigera-ca-bundle\") pod \"calico-node-mxdhc\" (UID: \"56e4c3a9-af29-4d6e-8b5f-b6728d754f2d\") " pod="calico-system/calico-node-mxdhc" Dec 13 13:58:13.075999 kubelet[1464]: I1213 13:58:13.075889 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/56e4c3a9-af29-4d6e-8b5f-b6728d754f2d-policysync\") pod \"calico-node-mxdhc\" (UID: \"56e4c3a9-af29-4d6e-8b5f-b6728d754f2d\") " pod="calico-system/calico-node-mxdhc" Dec 13 13:58:13.075999 kubelet[1464]: I1213 13:58:13.075909 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/56e4c3a9-af29-4d6e-8b5f-b6728d754f2d-var-lib-calico\") pod \"calico-node-mxdhc\" (UID: \"56e4c3a9-af29-4d6e-8b5f-b6728d754f2d\") " pod="calico-system/calico-node-mxdhc" Dec 13 13:58:13.075999 kubelet[1464]: I1213 13:58:13.075942 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/34b901f0-6f84-4b64-a266-ef37d4fd6b0a-lib-modules\") pod \"kube-proxy-7c4qf\" (UID: \"34b901f0-6f84-4b64-a266-ef37d4fd6b0a\") " pod="kube-system/kube-proxy-7c4qf" Dec 13 13:58:13.076110 kubelet[1464]: I1213 13:58:13.075967 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/56e4c3a9-af29-4d6e-8b5f-b6728d754f2d-xtables-lock\") pod \"calico-node-mxdhc\" (UID: \"56e4c3a9-af29-4d6e-8b5f-b6728d754f2d\") " pod="calico-system/calico-node-mxdhc" Dec 13 13:58:13.076110 kubelet[1464]: I1213 13:58:13.075985 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/56e4c3a9-af29-4d6e-8b5f-b6728d754f2d-node-certs\") pod \"calico-node-mxdhc\" (UID: \"56e4c3a9-af29-4d6e-8b5f-b6728d754f2d\") " pod="calico-system/calico-node-mxdhc" Dec 13 13:58:13.076110 kubelet[1464]: I1213 13:58:13.076014 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q5c9k\" (UniqueName: \"kubernetes.io/projected/56e4c3a9-af29-4d6e-8b5f-b6728d754f2d-kube-api-access-q5c9k\") pod \"calico-node-mxdhc\" (UID: \"56e4c3a9-af29-4d6e-8b5f-b6728d754f2d\") " pod="calico-system/calico-node-mxdhc" Dec 13 13:58:13.076110 kubelet[1464]: I1213 13:58:13.076043 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/c6e23b73-823d-4a32-93af-7220cd7c628d-kubelet-dir\") pod \"csi-node-driver-9f685\" (UID: \"c6e23b73-823d-4a32-93af-7220cd7c628d\") " pod="calico-system/csi-node-driver-9f685" Dec 13 13:58:13.076110 kubelet[1464]: I1213 13:58:13.076064 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/c6e23b73-823d-4a32-93af-7220cd7c628d-socket-dir\") pod \"csi-node-driver-9f685\" (UID: \"c6e23b73-823d-4a32-93af-7220cd7c628d\") " pod="calico-system/csi-node-driver-9f685" Dec 13 13:58:13.076229 kubelet[1464]: I1213 13:58:13.076183 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pgf48\" (UniqueName: \"kubernetes.io/projected/c6e23b73-823d-4a32-93af-7220cd7c628d-kube-api-access-pgf48\") pod \"csi-node-driver-9f685\" (UID: \"c6e23b73-823d-4a32-93af-7220cd7c628d\") " pod="calico-system/csi-node-driver-9f685" Dec 13 13:58:13.076998 kubelet[1464]: I1213 13:58:13.076281 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/34b901f0-6f84-4b64-a266-ef37d4fd6b0a-kube-proxy\") pod \"kube-proxy-7c4qf\" (UID: \"34b901f0-6f84-4b64-a266-ef37d4fd6b0a\") " pod="kube-system/kube-proxy-7c4qf" Dec 13 13:58:13.076998 kubelet[1464]: I1213 13:58:13.076894 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/56e4c3a9-af29-4d6e-8b5f-b6728d754f2d-lib-modules\") pod \"calico-node-mxdhc\" (UID: \"56e4c3a9-af29-4d6e-8b5f-b6728d754f2d\") " pod="calico-system/calico-node-mxdhc" Dec 13 13:58:13.076998 kubelet[1464]: I1213 13:58:13.076929 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/c6e23b73-823d-4a32-93af-7220cd7c628d-registration-dir\") pod \"csi-node-driver-9f685\" (UID: \"c6e23b73-823d-4a32-93af-7220cd7c628d\") " pod="calico-system/csi-node-driver-9f685" Dec 13 13:58:13.076998 kubelet[1464]: I1213 13:58:13.076949 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bnwj2\" (UniqueName: \"kubernetes.io/projected/34b901f0-6f84-4b64-a266-ef37d4fd6b0a-kube-api-access-bnwj2\") pod \"kube-proxy-7c4qf\" (UID: \"34b901f0-6f84-4b64-a266-ef37d4fd6b0a\") " pod="kube-system/kube-proxy-7c4qf" Dec 13 13:58:13.076998 kubelet[1464]: I1213 13:58:13.076969 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/56e4c3a9-af29-4d6e-8b5f-b6728d754f2d-cni-net-dir\") pod \"calico-node-mxdhc\" (UID: \"56e4c3a9-af29-4d6e-8b5f-b6728d754f2d\") " pod="calico-system/calico-node-mxdhc" Dec 13 13:58:13.077707 systemd[1]: Created slice kubepods-besteffort-pod34b901f0_6f84_4b64_a266_ef37d4fd6b0a.slice. Dec 13 13:58:13.179260 kubelet[1464]: E1213 13:58:13.179235 1464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:13.179420 kubelet[1464]: W1213 13:58:13.179403 1464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:13.179502 kubelet[1464]: E1213 13:58:13.179489 1464 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:13.179860 kubelet[1464]: E1213 13:58:13.179752 1464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:13.179860 kubelet[1464]: W1213 13:58:13.179768 1464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:13.179860 kubelet[1464]: E1213 13:58:13.179785 1464 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:13.180012 kubelet[1464]: E1213 13:58:13.179984 1464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:13.180012 kubelet[1464]: W1213 13:58:13.179992 1464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:13.180012 kubelet[1464]: E1213 13:58:13.180008 1464 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:13.180927 kubelet[1464]: E1213 13:58:13.180902 1464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:13.180927 kubelet[1464]: W1213 13:58:13.180920 1464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:13.181046 kubelet[1464]: E1213 13:58:13.180935 1464 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:13.181195 kubelet[1464]: E1213 13:58:13.181179 1464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:13.181195 kubelet[1464]: W1213 13:58:13.181191 1464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:13.181279 kubelet[1464]: E1213 13:58:13.181204 1464 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:13.181678 kubelet[1464]: E1213 13:58:13.181665 1464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:13.181773 kubelet[1464]: W1213 13:58:13.181760 1464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:13.181858 kubelet[1464]: E1213 13:58:13.181847 1464 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:13.190830 kubelet[1464]: E1213 13:58:13.190814 1464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:13.190937 kubelet[1464]: W1213 13:58:13.190924 1464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:13.191012 kubelet[1464]: E1213 13:58:13.190998 1464 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:13.191829 kubelet[1464]: E1213 13:58:13.191813 1464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:13.191925 kubelet[1464]: W1213 13:58:13.191912 1464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:13.192019 kubelet[1464]: E1213 13:58:13.192009 1464 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:13.192265 kubelet[1464]: E1213 13:58:13.192254 1464 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:58:13.192343 kubelet[1464]: W1213 13:58:13.192332 1464 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:58:13.192410 kubelet[1464]: E1213 13:58:13.192392 1464 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:58:13.378358 kubelet[1464]: E1213 13:58:13.377821 1464 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:13.378894 env[1214]: time="2024-12-13T13:58:13.378781246Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mxdhc,Uid:56e4c3a9-af29-4d6e-8b5f-b6728d754f2d,Namespace:calico-system,Attempt:0,}" Dec 13 13:58:13.380982 kubelet[1464]: E1213 13:58:13.380868 1464 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:13.381742 env[1214]: time="2024-12-13T13:58:13.381375291Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7c4qf,Uid:34b901f0-6f84-4b64-a266-ef37d4fd6b0a,Namespace:kube-system,Attempt:0,}" Dec 13 13:58:13.935552 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2118471125.mount: Deactivated successfully. Dec 13 13:58:14.021635 env[1214]: time="2024-12-13T13:58:14.021555112Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:14.025877 env[1214]: time="2024-12-13T13:58:14.025805423Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:14.027805 env[1214]: time="2024-12-13T13:58:14.027768866Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:14.029236 env[1214]: time="2024-12-13T13:58:14.029192699Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:14.030648 env[1214]: time="2024-12-13T13:58:14.030605533Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:14.032520 env[1214]: time="2024-12-13T13:58:14.032486684Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:14.034486 env[1214]: time="2024-12-13T13:58:14.034443373Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:14.036026 env[1214]: time="2024-12-13T13:58:14.035986661Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:14.054086 kubelet[1464]: E1213 13:58:14.054048 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:14.076477 env[1214]: time="2024-12-13T13:58:14.076046322Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:58:14.076592 env[1214]: time="2024-12-13T13:58:14.076499393Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:58:14.076592 env[1214]: time="2024-12-13T13:58:14.076533523Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:58:14.076592 env[1214]: time="2024-12-13T13:58:14.076543714Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:58:14.076755 env[1214]: time="2024-12-13T13:58:14.076711048Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:58:14.076859 env[1214]: time="2024-12-13T13:58:14.076822132Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e9b2f3d3e1ece15f32cf9f0bbe4f4d72349f5b0f99e448d844d0bd7a30103825 pid=1536 runtime=io.containerd.runc.v2 Dec 13 13:58:14.076943 env[1214]: time="2024-12-13T13:58:14.076825488Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:58:14.077216 env[1214]: time="2024-12-13T13:58:14.077154332Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4705897bd77edb97f1489904f8fab5655c263d9f497d359d5813d73761b7ea80 pid=1534 runtime=io.containerd.runc.v2 Dec 13 13:58:14.096607 systemd[1]: Started cri-containerd-4705897bd77edb97f1489904f8fab5655c263d9f497d359d5813d73761b7ea80.scope. Dec 13 13:58:14.097523 systemd[1]: Started cri-containerd-e9b2f3d3e1ece15f32cf9f0bbe4f4d72349f5b0f99e448d844d0bd7a30103825.scope. Dec 13 13:58:14.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit: BPF prog-id=55 op=LOAD Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1556]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1536 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:14.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539623266336433653165636531356633326366396630626265346634 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1556]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1536 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:14.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539623266336433653165636531356633326366396630626265346634 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit: BPF prog-id=56 op=LOAD Dec 13 13:58:14.128000 audit[1556]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1536 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:14.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539623266336433653165636531356633326366396630626265346634 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.128000 audit: BPF prog-id=57 op=LOAD Dec 13 13:58:14.128000 audit[1556]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1536 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:14.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539623266336433653165636531356633326366396630626265346634 Dec 13 13:58:14.128000 audit: BPF prog-id=57 op=UNLOAD Dec 13 13:58:14.128000 audit: BPF prog-id=56 op=UNLOAD Dec 13 13:58:14.129000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.129000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.129000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.129000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.129000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.129000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.129000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.129000 audit[1556]: AVC avc: denied { perfmon } for pid=1556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.129000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.129000 audit[1556]: AVC avc: denied { bpf } for pid=1556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.129000 audit: BPF prog-id=58 op=LOAD Dec 13 13:58:14.129000 audit[1556]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1536 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:14.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539623266336433653165636531356633326366396630626265346634 Dec 13 13:58:14.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit: BPF prog-id=59 op=LOAD Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1534 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:14.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437303538393762643737656462393766313438393930346638666162 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1534 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:14.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437303538393762643737656462393766313438393930346638666162 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit: BPF prog-id=60 op=LOAD Dec 13 13:58:14.130000 audit[1555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1534 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:14.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437303538393762643737656462393766313438393930346638666162 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit: BPF prog-id=61 op=LOAD Dec 13 13:58:14.130000 audit[1555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1534 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:14.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437303538393762643737656462393766313438393930346638666162 Dec 13 13:58:14.130000 audit: BPF prog-id=61 op=UNLOAD Dec 13 13:58:14.130000 audit: BPF prog-id=60 op=UNLOAD Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { perfmon } for pid=1555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit[1555]: AVC avc: denied { bpf } for pid=1555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:14.130000 audit: BPF prog-id=62 op=LOAD Dec 13 13:58:14.130000 audit[1555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1534 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:14.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437303538393762643737656462393766313438393930346638666162 Dec 13 13:58:14.145471 env[1214]: time="2024-12-13T13:58:14.145417663Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7c4qf,Uid:34b901f0-6f84-4b64-a266-ef37d4fd6b0a,Namespace:kube-system,Attempt:0,} returns sandbox id \"e9b2f3d3e1ece15f32cf9f0bbe4f4d72349f5b0f99e448d844d0bd7a30103825\"" Dec 13 13:58:14.146634 kubelet[1464]: E1213 13:58:14.146426 1464 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:14.146890 env[1214]: time="2024-12-13T13:58:14.146855286Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mxdhc,Uid:56e4c3a9-af29-4d6e-8b5f-b6728d754f2d,Namespace:calico-system,Attempt:0,} returns sandbox id \"4705897bd77edb97f1489904f8fab5655c263d9f497d359d5813d73761b7ea80\"" Dec 13 13:58:14.147302 kubelet[1464]: E1213 13:58:14.147282 1464 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:14.149099 env[1214]: time="2024-12-13T13:58:14.149064553Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 13:58:14.996600 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3755800406.mount: Deactivated successfully. Dec 13 13:58:15.054384 kubelet[1464]: E1213 13:58:15.054346 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:15.101642 env[1214]: time="2024-12-13T13:58:15.101601747Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:15.103000 env[1214]: time="2024-12-13T13:58:15.102961097Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:15.104428 env[1214]: time="2024-12-13T13:58:15.104367898Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:15.105912 env[1214]: time="2024-12-13T13:58:15.105873396Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:15.106372 env[1214]: time="2024-12-13T13:58:15.106341361Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348\"" Dec 13 13:58:15.106959 env[1214]: time="2024-12-13T13:58:15.106925710Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 13:58:15.108394 env[1214]: time="2024-12-13T13:58:15.108356136Z" level=info msg="CreateContainer within sandbox \"4705897bd77edb97f1489904f8fab5655c263d9f497d359d5813d73761b7ea80\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 13:58:15.120052 env[1214]: time="2024-12-13T13:58:15.120019062Z" level=info msg="CreateContainer within sandbox \"4705897bd77edb97f1489904f8fab5655c263d9f497d359d5813d73761b7ea80\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"b3aac69b2cb1965e30c2e507c6b2188c54650a45b9568cc2a896a504e540ed25\"" Dec 13 13:58:15.120880 env[1214]: time="2024-12-13T13:58:15.120848621Z" level=info msg="StartContainer for \"b3aac69b2cb1965e30c2e507c6b2188c54650a45b9568cc2a896a504e540ed25\"" Dec 13 13:58:15.135979 systemd[1]: Started cri-containerd-b3aac69b2cb1965e30c2e507c6b2188c54650a45b9568cc2a896a504e540ed25.scope. Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.164338 kernel: kauditd_printk_skb: 357 callbacks suppressed Dec 13 13:58:15.164421 kernel: audit: type=1400 audit(1734098295.160:458): avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.164459 kernel: audit: type=1300 audit(1734098295.160:458): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1534 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:15.160000 audit[1610]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1534 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:15.167093 kernel: audit: type=1327 audit(1734098295.160:458): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233616163363962326362313936356533306332653530376336623231 Dec 13 13:58:15.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233616163363962326362313936356533306332653530376336623231 Dec 13 13:58:15.169418 kernel: audit: type=1400 audit(1734098295.160:459): avc: denied { bpf } for pid=1610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { bpf } for pid=1610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.171100 kernel: audit: type=1400 audit(1734098295.160:459): avc: denied { bpf } for pid=1610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { bpf } for pid=1610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.172895 kernel: audit: type=1400 audit(1734098295.160:459): avc: denied { bpf } for pid=1610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { bpf } for pid=1610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.176979 kernel: audit: type=1400 audit(1734098295.160:459): avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.177044 kernel: audit: type=1400 audit(1734098295.160:459): avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.178641 kernel: audit: type=1400 audit(1734098295.160:459): avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.182163 kernel: audit: type=1400 audit(1734098295.160:459): avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { bpf } for pid=1610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { bpf } for pid=1610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit: BPF prog-id=63 op=LOAD Dec 13 13:58:15.160000 audit[1610]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1534 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:15.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233616163363962326362313936356533306332653530376336623231 Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { bpf } for pid=1610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { bpf } for pid=1610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { bpf } for pid=1610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit[1610]: AVC avc: denied { bpf } for pid=1610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.160000 audit: BPF prog-id=64 op=LOAD Dec 13 13:58:15.160000 audit[1610]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1534 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:15.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233616163363962326362313936356533306332653530376336623231 Dec 13 13:58:15.162000 audit: BPF prog-id=64 op=UNLOAD Dec 13 13:58:15.162000 audit: BPF prog-id=63 op=UNLOAD Dec 13 13:58:15.162000 audit[1610]: AVC avc: denied { bpf } for pid=1610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.162000 audit[1610]: AVC avc: denied { bpf } for pid=1610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.162000 audit[1610]: AVC avc: denied { bpf } for pid=1610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.162000 audit[1610]: AVC avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.162000 audit[1610]: AVC avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.162000 audit[1610]: AVC avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.162000 audit[1610]: AVC avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.162000 audit[1610]: AVC avc: denied { perfmon } for pid=1610 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.162000 audit[1610]: AVC avc: denied { bpf } for pid=1610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.162000 audit[1610]: AVC avc: denied { bpf } for pid=1610 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:15.162000 audit: BPF prog-id=65 op=LOAD Dec 13 13:58:15.162000 audit[1610]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1534 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:15.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233616163363962326362313936356533306332653530376336623231 Dec 13 13:58:15.194279 env[1214]: time="2024-12-13T13:58:15.194102415Z" level=info msg="StartContainer for \"b3aac69b2cb1965e30c2e507c6b2188c54650a45b9568cc2a896a504e540ed25\" returns successfully" Dec 13 13:58:15.205933 systemd[1]: cri-containerd-b3aac69b2cb1965e30c2e507c6b2188c54650a45b9568cc2a896a504e540ed25.scope: Deactivated successfully. Dec 13 13:58:15.211000 audit: BPF prog-id=65 op=UNLOAD Dec 13 13:58:15.223844 kubelet[1464]: E1213 13:58:15.223712 1464 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9f685" podUID="c6e23b73-823d-4a32-93af-7220cd7c628d" Dec 13 13:58:15.229761 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b3aac69b2cb1965e30c2e507c6b2188c54650a45b9568cc2a896a504e540ed25-rootfs.mount: Deactivated successfully. Dec 13 13:58:15.234220 kubelet[1464]: E1213 13:58:15.234138 1464 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:15.261898 env[1214]: time="2024-12-13T13:58:15.261793054Z" level=info msg="shim disconnected" id=b3aac69b2cb1965e30c2e507c6b2188c54650a45b9568cc2a896a504e540ed25 Dec 13 13:58:15.261898 env[1214]: time="2024-12-13T13:58:15.261837072Z" level=warning msg="cleaning up after shim disconnected" id=b3aac69b2cb1965e30c2e507c6b2188c54650a45b9568cc2a896a504e540ed25 namespace=k8s.io Dec 13 13:58:15.261898 env[1214]: time="2024-12-13T13:58:15.261846562Z" level=info msg="cleaning up dead shim" Dec 13 13:58:15.270982 env[1214]: time="2024-12-13T13:58:15.270948728Z" level=warning msg="cleanup warnings time=\"2024-12-13T13:58:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1648 runtime=io.containerd.runc.v2\n" Dec 13 13:58:16.055276 kubelet[1464]: E1213 13:58:16.055213 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:16.119299 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3604797174.mount: Deactivated successfully. Dec 13 13:58:16.236775 kubelet[1464]: E1213 13:58:16.236265 1464 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:16.535861 env[1214]: time="2024-12-13T13:58:16.535758161Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:16.537340 env[1214]: time="2024-12-13T13:58:16.537296843Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:768ee8cfd9311233d038d18430c18136e1ae4dd2e6de40fcf1c670bba2da6d06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:16.538810 env[1214]: time="2024-12-13T13:58:16.538775586Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:16.540070 env[1214]: time="2024-12-13T13:58:16.540046803Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:16.540511 env[1214]: time="2024-12-13T13:58:16.540489244Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:768ee8cfd9311233d038d18430c18136e1ae4dd2e6de40fcf1c670bba2da6d06\"" Dec 13 13:58:16.541750 env[1214]: time="2024-12-13T13:58:16.541671763Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 13:58:16.542542 env[1214]: time="2024-12-13T13:58:16.542511953Z" level=info msg="CreateContainer within sandbox \"e9b2f3d3e1ece15f32cf9f0bbe4f4d72349f5b0f99e448d844d0bd7a30103825\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 13:58:16.553132 env[1214]: time="2024-12-13T13:58:16.553090729Z" level=info msg="CreateContainer within sandbox \"e9b2f3d3e1ece15f32cf9f0bbe4f4d72349f5b0f99e448d844d0bd7a30103825\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"1ce22a9f8c93e2fce7c07185a095d3ae193bf731545d92267101bff597216bd7\"" Dec 13 13:58:16.554932 env[1214]: time="2024-12-13T13:58:16.554905669Z" level=info msg="StartContainer for \"1ce22a9f8c93e2fce7c07185a095d3ae193bf731545d92267101bff597216bd7\"" Dec 13 13:58:16.571361 systemd[1]: run-containerd-runc-k8s.io-1ce22a9f8c93e2fce7c07185a095d3ae193bf731545d92267101bff597216bd7-runc.lc6njL.mount: Deactivated successfully. Dec 13 13:58:16.578979 systemd[1]: Started cri-containerd-1ce22a9f8c93e2fce7c07185a095d3ae193bf731545d92267101bff597216bd7.scope. Dec 13 13:58:16.595000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.595000 audit[1675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1536 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163653232613966386339336532666365376330373138356130393564 Dec 13 13:58:16.595000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.595000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.595000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.595000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.595000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.595000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.595000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.595000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.595000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.595000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.595000 audit: BPF prog-id=66 op=LOAD Dec 13 13:58:16.595000 audit[1675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1536 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163653232613966386339336532666365376330373138356130393564 Dec 13 13:58:16.603000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.603000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.603000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.603000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.603000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.603000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.603000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.603000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.603000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.603000 audit: BPF prog-id=67 op=LOAD Dec 13 13:58:16.603000 audit[1675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1536 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163653232613966386339336532666365376330373138356130393564 Dec 13 13:58:16.606000 audit: BPF prog-id=67 op=UNLOAD Dec 13 13:58:16.606000 audit: BPF prog-id=66 op=UNLOAD Dec 13 13:58:16.606000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.606000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.606000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.606000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.606000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.606000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.606000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.606000 audit[1675]: AVC avc: denied { perfmon } for pid=1675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.606000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.606000 audit[1675]: AVC avc: denied { bpf } for pid=1675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:16.606000 audit: BPF prog-id=68 op=LOAD Dec 13 13:58:16.606000 audit[1675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1536 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163653232613966386339336532666365376330373138356130393564 Dec 13 13:58:16.622409 env[1214]: time="2024-12-13T13:58:16.622294788Z" level=info msg="StartContainer for \"1ce22a9f8c93e2fce7c07185a095d3ae193bf731545d92267101bff597216bd7\" returns successfully" Dec 13 13:58:16.737000 audit[1728]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.737000 audit[1728]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe9a2d460 a2=0 a3=1 items=0 ppid=1686 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.737000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 13:58:16.737000 audit[1729]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:16.737000 audit[1729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcc9b5c40 a2=0 a3=1 items=0 ppid=1686 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.737000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 13:58:16.739000 audit[1731]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.739000 audit[1731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd5e8e650 a2=0 a3=1 items=0 ppid=1686 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.739000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 13:58:16.739000 audit[1732]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:16.739000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff73a0880 a2=0 a3=1 items=0 ppid=1686 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.739000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 13:58:16.740000 audit[1733]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:16.740000 audit[1733]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe2704c10 a2=0 a3=1 items=0 ppid=1686 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.740000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 13:58:16.741000 audit[1734]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.741000 audit[1734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc8baa040 a2=0 a3=1 items=0 ppid=1686 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.741000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 13:58:16.839000 audit[1735]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.839000 audit[1735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff553f570 a2=0 a3=1 items=0 ppid=1686 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.839000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 13:58:16.844000 audit[1737]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.844000 audit[1737]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcb358d60 a2=0 a3=1 items=0 ppid=1686 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.844000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 13:58:16.848000 audit[1740]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.848000 audit[1740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffdacc460 a2=0 a3=1 items=0 ppid=1686 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.848000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 13:58:16.849000 audit[1741]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.849000 audit[1741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdefaa660 a2=0 a3=1 items=0 ppid=1686 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.849000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 13:58:16.851000 audit[1743]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.851000 audit[1743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd75e6b10 a2=0 a3=1 items=0 ppid=1686 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.851000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 13:58:16.855000 audit[1744]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.855000 audit[1744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcbd8ec60 a2=0 a3=1 items=0 ppid=1686 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.855000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 13:58:16.856000 audit[1746]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.856000 audit[1746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffca7c2d80 a2=0 a3=1 items=0 ppid=1686 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.856000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 13:58:16.861000 audit[1749]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.861000 audit[1749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff634b430 a2=0 a3=1 items=0 ppid=1686 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.861000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 13:58:16.864000 audit[1750]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.864000 audit[1750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2807f70 a2=0 a3=1 items=0 ppid=1686 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.864000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 13:58:16.867000 audit[1752]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.867000 audit[1752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc1ee91a0 a2=0 a3=1 items=0 ppid=1686 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.867000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 13:58:16.869000 audit[1753]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.869000 audit[1753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc58b8ef0 a2=0 a3=1 items=0 ppid=1686 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.869000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 13:58:16.871000 audit[1755]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.871000 audit[1755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc08ed650 a2=0 a3=1 items=0 ppid=1686 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.871000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 13:58:16.875000 audit[1758]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.875000 audit[1758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc5b9f0f0 a2=0 a3=1 items=0 ppid=1686 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 13:58:16.880000 audit[1761]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.880000 audit[1761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdb381a50 a2=0 a3=1 items=0 ppid=1686 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.880000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 13:58:16.881000 audit[1762]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.881000 audit[1762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc7633590 a2=0 a3=1 items=0 ppid=1686 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.881000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 13:58:16.885000 audit[1764]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.885000 audit[1764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffdedb920 a2=0 a3=1 items=0 ppid=1686 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.885000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 13:58:16.913000 audit[1769]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.913000 audit[1769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=fffff8f8a6c0 a2=0 a3=1 items=0 ppid=1686 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.913000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 13:58:16.914000 audit[1770]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.914000 audit[1770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe17fc310 a2=0 a3=1 items=0 ppid=1686 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.914000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 13:58:16.917000 audit[1772]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:58:16.917000 audit[1772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffffdf01ed0 a2=0 a3=1 items=0 ppid=1686 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.917000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 13:58:16.938000 audit[1778]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:16.938000 audit[1778]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffeb957fc0 a2=0 a3=1 items=0 ppid=1686 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.938000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:16.959000 audit[1778]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:16.959000 audit[1778]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9084 a0=3 a1=ffffeb957fc0 a2=0 a3=1 items=0 ppid=1686 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.959000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:16.961000 audit[1784]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:16.961000 audit[1784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc8f88f70 a2=0 a3=1 items=0 ppid=1686 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.961000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 13:58:16.964000 audit[1786]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:16.964000 audit[1786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd471ba20 a2=0 a3=1 items=0 ppid=1686 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.964000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 13:58:16.968000 audit[1789]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:16.968000 audit[1789]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd5f0e760 a2=0 a3=1 items=0 ppid=1686 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.968000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 13:58:16.969000 audit[1790]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:16.969000 audit[1790]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffda51ef50 a2=0 a3=1 items=0 ppid=1686 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.969000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 13:58:16.972000 audit[1792]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:16.972000 audit[1792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdb3109b0 a2=0 a3=1 items=0 ppid=1686 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.972000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 13:58:16.972000 audit[1793]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:16.972000 audit[1793]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc46dfaa0 a2=0 a3=1 items=0 ppid=1686 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.972000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 13:58:16.974000 audit[1795]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:16.974000 audit[1795]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff1028e50 a2=0 a3=1 items=0 ppid=1686 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.974000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 13:58:16.980000 audit[1798]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:16.980000 audit[1798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffffa24be20 a2=0 a3=1 items=0 ppid=1686 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.980000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 13:58:16.980000 audit[1799]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:16.980000 audit[1799]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc7a029f0 a2=0 a3=1 items=0 ppid=1686 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.980000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 13:58:16.983000 audit[1801]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:16.983000 audit[1801]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdb9e4e60 a2=0 a3=1 items=0 ppid=1686 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.983000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 13:58:16.984000 audit[1802]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:16.984000 audit[1802]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd75951e0 a2=0 a3=1 items=0 ppid=1686 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.984000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 13:58:16.988000 audit[1804]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:16.988000 audit[1804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd58bbcd0 a2=0 a3=1 items=0 ppid=1686 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.988000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 13:58:16.992000 audit[1807]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:16.992000 audit[1807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffa21b5e0 a2=0 a3=1 items=0 ppid=1686 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.992000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 13:58:16.995000 audit[1810]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1810 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:16.995000 audit[1810]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe5734400 a2=0 a3=1 items=0 ppid=1686 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.995000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 13:58:16.996000 audit[1811]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:16.996000 audit[1811]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffd6fbd00 a2=0 a3=1 items=0 ppid=1686 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.996000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 13:58:16.998000 audit[1813]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1813 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:16.998000 audit[1813]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffa717c30 a2=0 a3=1 items=0 ppid=1686 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:16.998000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 13:58:17.001000 audit[1816]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:17.001000 audit[1816]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffef1316e0 a2=0 a3=1 items=0 ppid=1686 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:17.001000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 13:58:17.002000 audit[1817]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1817 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:17.002000 audit[1817]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe50724e0 a2=0 a3=1 items=0 ppid=1686 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:17.002000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 13:58:17.005000 audit[1819]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1819 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:17.005000 audit[1819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffed133430 a2=0 a3=1 items=0 ppid=1686 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:17.005000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 13:58:17.006000 audit[1820]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:17.006000 audit[1820]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffea38a210 a2=0 a3=1 items=0 ppid=1686 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:17.006000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 13:58:17.008000 audit[1822]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1822 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:17.008000 audit[1822]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff9b3eeb0 a2=0 a3=1 items=0 ppid=1686 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:17.008000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 13:58:17.011000 audit[1825]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1825 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:58:17.011000 audit[1825]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcbc10df0 a2=0 a3=1 items=0 ppid=1686 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:17.011000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 13:58:17.014000 audit[1827]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1827 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 13:58:17.014000 audit[1827]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffcf8e6b00 a2=0 a3=1 items=0 ppid=1686 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:17.014000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:17.014000 audit[1827]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1827 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 13:58:17.014000 audit[1827]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffcf8e6b00 a2=0 a3=1 items=0 ppid=1686 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:17.014000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:17.055961 kubelet[1464]: E1213 13:58:17.055906 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:17.222924 kubelet[1464]: E1213 13:58:17.222802 1464 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9f685" podUID="c6e23b73-823d-4a32-93af-7220cd7c628d" Dec 13 13:58:17.238461 kubelet[1464]: E1213 13:58:17.238426 1464 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:18.056593 kubelet[1464]: E1213 13:58:18.056549 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:18.239654 kubelet[1464]: E1213 13:58:18.239620 1464 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:19.057020 kubelet[1464]: E1213 13:58:19.056978 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:19.223332 kubelet[1464]: E1213 13:58:19.223292 1464 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9f685" podUID="c6e23b73-823d-4a32-93af-7220cd7c628d" Dec 13 13:58:19.493016 env[1214]: time="2024-12-13T13:58:19.492905108Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:19.495092 env[1214]: time="2024-12-13T13:58:19.495061038Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:19.496794 env[1214]: time="2024-12-13T13:58:19.496767134Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:19.498514 env[1214]: time="2024-12-13T13:58:19.498473390Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:19.499142 env[1214]: time="2024-12-13T13:58:19.499111798Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f\"" Dec 13 13:58:19.501282 env[1214]: time="2024-12-13T13:58:19.501248058Z" level=info msg="CreateContainer within sandbox \"4705897bd77edb97f1489904f8fab5655c263d9f497d359d5813d73761b7ea80\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 13:58:19.510527 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount402189613.mount: Deactivated successfully. Dec 13 13:58:19.513969 env[1214]: time="2024-12-13T13:58:19.513927807Z" level=info msg="CreateContainer within sandbox \"4705897bd77edb97f1489904f8fab5655c263d9f497d359d5813d73761b7ea80\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d22452babc2c32dae741843fc329bc89f725dbc8ca8714dca0e9ffd702ab1e88\"" Dec 13 13:58:19.514547 env[1214]: time="2024-12-13T13:58:19.514475387Z" level=info msg="StartContainer for \"d22452babc2c32dae741843fc329bc89f725dbc8ca8714dca0e9ffd702ab1e88\"" Dec 13 13:58:19.530843 systemd[1]: Started cri-containerd-d22452babc2c32dae741843fc329bc89f725dbc8ca8714dca0e9ffd702ab1e88.scope. Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1534 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432323435326261626332633332646165373431383433666333323962 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit: BPF prog-id=69 op=LOAD Dec 13 13:58:19.550000 audit[1837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1534 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432323435326261626332633332646165373431383433666333323962 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit: BPF prog-id=70 op=LOAD Dec 13 13:58:19.550000 audit[1837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1534 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432323435326261626332633332646165373431383433666333323962 Dec 13 13:58:19.550000 audit: BPF prog-id=70 op=UNLOAD Dec 13 13:58:19.550000 audit: BPF prog-id=69 op=UNLOAD Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { perfmon } for pid=1837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit[1837]: AVC avc: denied { bpf } for pid=1837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:19.550000 audit: BPF prog-id=71 op=LOAD Dec 13 13:58:19.550000 audit[1837]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1534 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:19.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432323435326261626332633332646165373431383433666333323962 Dec 13 13:58:19.565632 env[1214]: time="2024-12-13T13:58:19.565591038Z" level=info msg="StartContainer for \"d22452babc2c32dae741843fc329bc89f725dbc8ca8714dca0e9ffd702ab1e88\" returns successfully" Dec 13 13:58:20.027869 env[1214]: time="2024-12-13T13:58:20.027809487Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 13:58:20.030117 systemd[1]: cri-containerd-d22452babc2c32dae741843fc329bc89f725dbc8ca8714dca0e9ffd702ab1e88.scope: Deactivated successfully. Dec 13 13:58:20.033671 kubelet[1464]: I1213 13:58:20.032995 1464 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 13:58:20.034000 audit: BPF prog-id=71 op=UNLOAD Dec 13 13:58:20.048747 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d22452babc2c32dae741843fc329bc89f725dbc8ca8714dca0e9ffd702ab1e88-rootfs.mount: Deactivated successfully. Dec 13 13:58:20.057991 kubelet[1464]: E1213 13:58:20.057908 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:20.207414 env[1214]: time="2024-12-13T13:58:20.207365817Z" level=info msg="shim disconnected" id=d22452babc2c32dae741843fc329bc89f725dbc8ca8714dca0e9ffd702ab1e88 Dec 13 13:58:20.207414 env[1214]: time="2024-12-13T13:58:20.207416706Z" level=warning msg="cleaning up after shim disconnected" id=d22452babc2c32dae741843fc329bc89f725dbc8ca8714dca0e9ffd702ab1e88 namespace=k8s.io Dec 13 13:58:20.207622 env[1214]: time="2024-12-13T13:58:20.207426916Z" level=info msg="cleaning up dead shim" Dec 13 13:58:20.213977 env[1214]: time="2024-12-13T13:58:20.213942201Z" level=warning msg="cleanup warnings time=\"2024-12-13T13:58:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1879 runtime=io.containerd.runc.v2\n" Dec 13 13:58:20.243101 kubelet[1464]: E1213 13:58:20.243080 1464 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:20.243892 env[1214]: time="2024-12-13T13:58:20.243856719Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 13:58:20.257786 kubelet[1464]: I1213 13:58:20.257703 1464 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-7c4qf" podStartSLOduration=6.8645445590000005 podStartE2EDuration="9.257658102s" podCreationTimestamp="2024-12-13 13:58:11 +0000 UTC" firstStartedPulling="2024-12-13 13:58:14.147714479 +0000 UTC m=+3.779656978" lastFinishedPulling="2024-12-13 13:58:16.540828023 +0000 UTC m=+6.172770521" observedRunningTime="2024-12-13 13:58:17.300308189 +0000 UTC m=+6.932250687" watchObservedRunningTime="2024-12-13 13:58:20.257658102 +0000 UTC m=+9.889600600" Dec 13 13:58:21.058391 kubelet[1464]: E1213 13:58:21.058347 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:21.229887 systemd[1]: Created slice kubepods-besteffort-podc6e23b73_823d_4a32_93af_7220cd7c628d.slice. Dec 13 13:58:21.232227 env[1214]: time="2024-12-13T13:58:21.232186120Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9f685,Uid:c6e23b73-823d-4a32-93af-7220cd7c628d,Namespace:calico-system,Attempt:0,}" Dec 13 13:58:21.352664 env[1214]: time="2024-12-13T13:58:21.352520687Z" level=error msg="Failed to destroy network for sandbox \"e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:21.354155 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca-shm.mount: Deactivated successfully. Dec 13 13:58:21.355109 env[1214]: time="2024-12-13T13:58:21.355067399Z" level=error msg="encountered an error cleaning up failed sandbox \"e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:21.355247 env[1214]: time="2024-12-13T13:58:21.355215594Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9f685,Uid:c6e23b73-823d-4a32-93af-7220cd7c628d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:21.355536 kubelet[1464]: E1213 13:58:21.355512 1464 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:21.355611 kubelet[1464]: E1213 13:58:21.355576 1464 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9f685" Dec 13 13:58:21.355611 kubelet[1464]: E1213 13:58:21.355598 1464 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9f685" Dec 13 13:58:21.355676 kubelet[1464]: E1213 13:58:21.355651 1464 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-9f685_calico-system(c6e23b73-823d-4a32-93af-7220cd7c628d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-9f685_calico-system(c6e23b73-823d-4a32-93af-7220cd7c628d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9f685" podUID="c6e23b73-823d-4a32-93af-7220cd7c628d" Dec 13 13:58:22.059307 kubelet[1464]: E1213 13:58:22.059264 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:22.248085 kubelet[1464]: I1213 13:58:22.247623 1464 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca" Dec 13 13:58:22.248445 env[1214]: time="2024-12-13T13:58:22.248408572Z" level=info msg="StopPodSandbox for \"e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca\"" Dec 13 13:58:22.277750 env[1214]: time="2024-12-13T13:58:22.277685796Z" level=error msg="StopPodSandbox for \"e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca\" failed" error="failed to destroy network for sandbox \"e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:22.278113 kubelet[1464]: E1213 13:58:22.278085 1464 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca" Dec 13 13:58:22.278196 kubelet[1464]: E1213 13:58:22.278157 1464 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca"} Dec 13 13:58:22.278196 kubelet[1464]: E1213 13:58:22.278194 1464 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c6e23b73-823d-4a32-93af-7220cd7c628d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 13:58:22.278290 kubelet[1464]: E1213 13:58:22.278228 1464 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c6e23b73-823d-4a32-93af-7220cd7c628d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9f685" podUID="c6e23b73-823d-4a32-93af-7220cd7c628d" Dec 13 13:58:23.056488 kubelet[1464]: I1213 13:58:23.056067 1464 topology_manager.go:215] "Topology Admit Handler" podUID="3c2bb878-f4b5-4fcb-9cec-6dbf34ef4a9b" podNamespace="default" podName="nginx-deployment-6d5f899847-swrch" Dec 13 13:58:23.059610 kubelet[1464]: E1213 13:58:23.059435 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:23.064956 systemd[1]: Created slice kubepods-besteffort-pod3c2bb878_f4b5_4fcb_9cec_6dbf34ef4a9b.slice. Dec 13 13:58:23.250355 kubelet[1464]: I1213 13:58:23.250329 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7mmzr\" (UniqueName: \"kubernetes.io/projected/3c2bb878-f4b5-4fcb-9cec-6dbf34ef4a9b-kube-api-access-7mmzr\") pod \"nginx-deployment-6d5f899847-swrch\" (UID: \"3c2bb878-f4b5-4fcb-9cec-6dbf34ef4a9b\") " pod="default/nginx-deployment-6d5f899847-swrch" Dec 13 13:58:23.367285 env[1214]: time="2024-12-13T13:58:23.367188822Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-swrch,Uid:3c2bb878-f4b5-4fcb-9cec-6dbf34ef4a9b,Namespace:default,Attempt:0,}" Dec 13 13:58:23.515208 env[1214]: time="2024-12-13T13:58:23.515137099Z" level=error msg="Failed to destroy network for sandbox \"d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:23.516825 env[1214]: time="2024-12-13T13:58:23.515486005Z" level=error msg="encountered an error cleaning up failed sandbox \"d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:23.516825 env[1214]: time="2024-12-13T13:58:23.515531234Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-swrch,Uid:3c2bb878-f4b5-4fcb-9cec-6dbf34ef4a9b,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:23.516640 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9-shm.mount: Deactivated successfully. Dec 13 13:58:23.517426 kubelet[1464]: E1213 13:58:23.517327 1464 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:23.517426 kubelet[1464]: E1213 13:58:23.517383 1464 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-swrch" Dec 13 13:58:23.517426 kubelet[1464]: E1213 13:58:23.517404 1464 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-swrch" Dec 13 13:58:23.517562 kubelet[1464]: E1213 13:58:23.517457 1464 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-swrch_default(3c2bb878-f4b5-4fcb-9cec-6dbf34ef4a9b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-swrch_default(3c2bb878-f4b5-4fcb-9cec-6dbf34ef4a9b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-swrch" podUID="3c2bb878-f4b5-4fcb-9cec-6dbf34ef4a9b" Dec 13 13:58:24.060132 kubelet[1464]: E1213 13:58:24.060086 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:24.251694 kubelet[1464]: I1213 13:58:24.251660 1464 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9" Dec 13 13:58:24.252232 env[1214]: time="2024-12-13T13:58:24.252193226Z" level=info msg="StopPodSandbox for \"d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9\"" Dec 13 13:58:24.277309 env[1214]: time="2024-12-13T13:58:24.277252540Z" level=error msg="StopPodSandbox for \"d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9\" failed" error="failed to destroy network for sandbox \"d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:58:24.277541 kubelet[1464]: E1213 13:58:24.277501 1464 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9" Dec 13 13:58:24.277599 kubelet[1464]: E1213 13:58:24.277551 1464 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9"} Dec 13 13:58:24.277599 kubelet[1464]: E1213 13:58:24.277588 1464 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3c2bb878-f4b5-4fcb-9cec-6dbf34ef4a9b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 13:58:24.277681 kubelet[1464]: E1213 13:58:24.277616 1464 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3c2bb878-f4b5-4fcb-9cec-6dbf34ef4a9b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-swrch" podUID="3c2bb878-f4b5-4fcb-9cec-6dbf34ef4a9b" Dec 13 13:58:24.372015 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1811310731.mount: Deactivated successfully. Dec 13 13:58:24.509166 env[1214]: time="2024-12-13T13:58:24.509079454Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:24.512038 env[1214]: time="2024-12-13T13:58:24.512000089Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:24.513841 env[1214]: time="2024-12-13T13:58:24.513797376Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:24.515763 env[1214]: time="2024-12-13T13:58:24.515712240Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:24.516610 env[1214]: time="2024-12-13T13:58:24.516564129Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758\"" Dec 13 13:58:24.524521 env[1214]: time="2024-12-13T13:58:24.524482490Z" level=info msg="CreateContainer within sandbox \"4705897bd77edb97f1489904f8fab5655c263d9f497d359d5813d73761b7ea80\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 13:58:24.535977 env[1214]: time="2024-12-13T13:58:24.535921252Z" level=info msg="CreateContainer within sandbox \"4705897bd77edb97f1489904f8fab5655c263d9f497d359d5813d73761b7ea80\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"af4f4396fa089c020631549ce2ea451b657c94f9cb1f3dfb5f7e2996d4a8e00c\"" Dec 13 13:58:24.541347 env[1214]: time="2024-12-13T13:58:24.540907104Z" level=info msg="StartContainer for \"af4f4396fa089c020631549ce2ea451b657c94f9cb1f3dfb5f7e2996d4a8e00c\"" Dec 13 13:58:24.555518 systemd[1]: Started cri-containerd-af4f4396fa089c020631549ce2ea451b657c94f9cb1f3dfb5f7e2996d4a8e00c.scope. Dec 13 13:58:24.584767 kernel: kauditd_printk_skb: 274 callbacks suppressed Dec 13 13:58:24.584871 kernel: audit: type=1400 audit(1734098304.581:529): avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.584912 kernel: audit: type=1300 audit(1734098304.581:529): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1534 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:24.581000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.581000 audit[2025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1534 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:24.587209 kernel: audit: type=1327 audit(1734098304.581:529): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166346634333936666130383963303230363331353439636532656134 Dec 13 13:58:24.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166346634333936666130383963303230363331353439636532656134 Dec 13 13:58:24.583000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.592795 kernel: audit: type=1400 audit(1734098304.583:530): avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.592872 kernel: audit: type=1400 audit(1734098304.583:530): avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.583000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.583000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.598170 kernel: audit: type=1400 audit(1734098304.583:530): avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.598247 kernel: audit: type=1400 audit(1734098304.583:530): avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.583000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.600131 kernel: audit: type=1400 audit(1734098304.583:530): avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.583000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.601899 kernel: audit: type=1400 audit(1734098304.583:530): avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.583000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.583000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.605995 env[1214]: time="2024-12-13T13:58:24.605949711Z" level=info msg="StartContainer for \"af4f4396fa089c020631549ce2ea451b657c94f9cb1f3dfb5f7e2996d4a8e00c\" returns successfully" Dec 13 13:58:24.606132 kernel: audit: type=1400 audit(1734098304.583:530): avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.583000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.583000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.583000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.583000 audit: BPF prog-id=72 op=LOAD Dec 13 13:58:24.583000 audit[2025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1534 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:24.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166346634333936666130383963303230363331353439636532656134 Dec 13 13:58:24.583000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.583000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.583000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.583000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.583000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.583000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.583000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.583000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.583000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.583000 audit: BPF prog-id=73 op=LOAD Dec 13 13:58:24.583000 audit[2025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1534 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:24.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166346634333936666130383963303230363331353439636532656134 Dec 13 13:58:24.586000 audit: BPF prog-id=73 op=UNLOAD Dec 13 13:58:24.586000 audit: BPF prog-id=72 op=UNLOAD Dec 13 13:58:24.586000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.586000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.586000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.586000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.586000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.586000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.586000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.586000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.586000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.586000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:24.586000 audit: BPF prog-id=74 op=LOAD Dec 13 13:58:24.586000 audit[2025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1534 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:24.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166346634333936666130383963303230363331353439636532656134 Dec 13 13:58:24.773763 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 13:58:24.773841 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 13:58:25.028000 audit[2147]: AVC avc: denied { write } for pid=2147 comm="tee" name="fd" dev="proc" ino=14636 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:58:25.028000 audit[2147]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcd145a2c a2=241 a3=1b6 items=1 ppid=2098 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.028000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 13:58:25.028000 audit: PATH item=0 name="/dev/fd/63" inode=14631 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:58:25.028000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:58:25.035000 audit[2155]: AVC avc: denied { write } for pid=2155 comm="tee" name="fd" dev="proc" ino=14643 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:58:25.035000 audit[2155]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc1d19a2a a2=241 a3=1b6 items=1 ppid=2094 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.035000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 13:58:25.035000 audit: PATH item=0 name="/dev/fd/63" inode=15558 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:58:25.035000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:58:25.038000 audit[2160]: AVC avc: denied { write } for pid=2160 comm="tee" name="fd" dev="proc" ino=14647 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:58:25.038000 audit[2160]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd5932a1a a2=241 a3=1b6 items=1 ppid=2102 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.038000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 13:58:25.038000 audit: PATH item=0 name="/dev/fd/63" inode=14640 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:58:25.038000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:58:25.043000 audit[2158]: AVC avc: denied { write } for pid=2158 comm="tee" name="fd" dev="proc" ino=13144 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:58:25.043000 audit[2158]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffec399a2a a2=241 a3=1b6 items=1 ppid=2092 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.043000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 13:58:25.043000 audit: PATH item=0 name="/dev/fd/63" inode=13138 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:58:25.043000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:58:25.033000 audit[2144]: AVC avc: denied { write } for pid=2144 comm="tee" name="fd" dev="proc" ino=15563 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:58:25.033000 audit[2144]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe2e9ea2a a2=241 a3=1b6 items=1 ppid=2093 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.033000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 13:58:25.033000 audit: PATH item=0 name="/dev/fd/63" inode=13956 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:58:25.033000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:58:25.044000 audit[2167]: AVC avc: denied { write } for pid=2167 comm="tee" name="fd" dev="proc" ino=13148 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:58:25.044000 audit[2167]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe1a63a2b a2=241 a3=1b6 items=1 ppid=2106 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.044000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 13:58:25.044000 audit: PATH item=0 name="/dev/fd/63" inode=13141 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:58:25.044000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:58:25.053000 audit[2164]: AVC avc: denied { write } for pid=2164 comm="tee" name="fd" dev="proc" ino=13152 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:58:25.053000 audit[2164]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffca9b8a1b a2=241 a3=1b6 items=1 ppid=2100 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.053000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 13:58:25.053000 audit: PATH item=0 name="/dev/fd/63" inode=15564 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:58:25.053000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:58:25.060768 kubelet[1464]: E1213 13:58:25.060723 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit: BPF prog-id=75 op=LOAD Dec 13 13:58:25.151000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff80e4d88 a2=98 a3=fffff80e4d78 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.151000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.151000 audit: BPF prog-id=75 op=UNLOAD Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit: BPF prog-id=76 op=LOAD Dec 13 13:58:25.151000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff80e4a18 a2=74 a3=95 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.151000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.151000 audit: BPF prog-id=76 op=UNLOAD Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.151000 audit: BPF prog-id=77 op=LOAD Dec 13 13:58:25.151000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff80e4a78 a2=94 a3=2 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.151000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.151000 audit: BPF prog-id=77 op=UNLOAD Dec 13 13:58:25.234000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.234000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.234000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.234000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.234000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.234000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.234000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.234000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.234000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.234000 audit: BPF prog-id=78 op=LOAD Dec 13 13:58:25.234000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff80e4a38 a2=40 a3=fffff80e4a68 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.234000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.234000 audit: BPF prog-id=78 op=UNLOAD Dec 13 13:58:25.234000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.234000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff80e4b50 a2=50 a3=0 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.234000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff80e4aa8 a2=28 a3=fffff80e4bd8 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.243000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff80e4ad8 a2=28 a3=fffff80e4c08 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.243000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff80e4988 a2=28 a3=fffff80e4ab8 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.243000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff80e4af8 a2=28 a3=fffff80e4c28 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.243000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff80e4ad8 a2=28 a3=fffff80e4c08 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.243000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff80e4ac8 a2=28 a3=fffff80e4bf8 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.243000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff80e4af8 a2=28 a3=fffff80e4c28 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.243000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff80e4ad8 a2=28 a3=fffff80e4c08 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.243000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff80e4af8 a2=28 a3=fffff80e4c28 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.243000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff80e4ac8 a2=28 a3=fffff80e4bf8 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.243000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff80e4b48 a2=28 a3=fffff80e4c88 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.243000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff80e4880 a2=50 a3=0 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.243000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit: BPF prog-id=79 op=LOAD Dec 13 13:58:25.243000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff80e4888 a2=94 a3=5 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.243000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.243000 audit: BPF prog-id=79 op=UNLOAD Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff80e4990 a2=50 a3=0 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.243000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff80e4ad8 a2=4 a3=3 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.243000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.243000 audit[2210]: AVC avc: denied { confidentiality } for pid=2210 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:58:25.243000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff80e4ab8 a2=94 a3=6 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.243000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { confidentiality } for pid=2210 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:58:25.244000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff80e4288 a2=94 a3=83 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.244000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { perfmon } for pid=2210 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { bpf } for pid=2210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.244000 audit[2210]: AVC avc: denied { confidentiality } for pid=2210 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:58:25.244000 audit[2210]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff80e4288 a2=94 a3=83 items=0 ppid=2095 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.244000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:58:25.255431 kubelet[1464]: E1213 13:58:25.255395 1464 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit: BPF prog-id=80 op=LOAD Dec 13 13:58:25.257000 audit[2213]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdaa44f38 a2=98 a3=ffffdaa44f28 items=0 ppid=2095 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.257000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 13:58:25.257000 audit: BPF prog-id=80 op=UNLOAD Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit: BPF prog-id=81 op=LOAD Dec 13 13:58:25.257000 audit[2213]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdaa44de8 a2=74 a3=95 items=0 ppid=2095 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.257000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 13:58:25.257000 audit: BPF prog-id=81 op=UNLOAD Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.257000 audit: BPF prog-id=82 op=LOAD Dec 13 13:58:25.257000 audit[2213]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdaa44e18 a2=40 a3=ffffdaa44e48 items=0 ppid=2095 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.257000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 13:58:25.257000 audit: BPF prog-id=82 op=UNLOAD Dec 13 13:58:25.272110 kubelet[1464]: I1213 13:58:25.271753 1464 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-mxdhc" podStartSLOduration=3.902486695 podStartE2EDuration="14.271687843s" podCreationTimestamp="2024-12-13 13:58:11 +0000 UTC" firstStartedPulling="2024-12-13 13:58:14.14765823 +0000 UTC m=+3.779600728" lastFinishedPulling="2024-12-13 13:58:24.516859378 +0000 UTC m=+14.148801876" observedRunningTime="2024-12-13 13:58:25.271365592 +0000 UTC m=+14.903308090" watchObservedRunningTime="2024-12-13 13:58:25.271687843 +0000 UTC m=+14.903630341" Dec 13 13:58:25.309189 systemd-networkd[1045]: vxlan.calico: Link UP Dec 13 13:58:25.309197 systemd-networkd[1045]: vxlan.calico: Gained carrier Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit: BPF prog-id=83 op=LOAD Dec 13 13:58:25.332000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdd966cc8 a2=98 a3=ffffdd966cb8 items=0 ppid=2095 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:25.332000 audit: BPF prog-id=83 op=UNLOAD Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit: BPF prog-id=84 op=LOAD Dec 13 13:58:25.332000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdd9669a8 a2=74 a3=95 items=0 ppid=2095 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:25.332000 audit: BPF prog-id=84 op=UNLOAD Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit: BPF prog-id=85 op=LOAD Dec 13 13:58:25.332000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdd966a08 a2=94 a3=2 items=0 ppid=2095 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:25.332000 audit: BPF prog-id=85 op=UNLOAD Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdd966a38 a2=28 a3=ffffdd966b68 items=0 ppid=2095 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdd966a68 a2=28 a3=ffffdd966b98 items=0 ppid=2095 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdd966918 a2=28 a3=ffffdd966a48 items=0 ppid=2095 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdd966a88 a2=28 a3=ffffdd966bb8 items=0 ppid=2095 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdd966a68 a2=28 a3=ffffdd966b98 items=0 ppid=2095 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdd966a58 a2=28 a3=ffffdd966b88 items=0 ppid=2095 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdd966a88 a2=28 a3=ffffdd966bb8 items=0 ppid=2095 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdd966a68 a2=28 a3=ffffdd966b98 items=0 ppid=2095 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdd966a88 a2=28 a3=ffffdd966bb8 items=0 ppid=2095 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdd966a58 a2=28 a3=ffffdd966b88 items=0 ppid=2095 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdd966ad8 a2=28 a3=ffffdd966c18 items=0 ppid=2095 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.332000 audit: BPF prog-id=86 op=LOAD Dec 13 13:58:25.332000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdd9668f8 a2=40 a3=ffffdd966928 items=0 ppid=2095 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.332000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:25.332000 audit: BPF prog-id=86 op=UNLOAD Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffdd966920 a2=50 a3=0 items=0 ppid=2095 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.333000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffdd966920 a2=50 a3=0 items=0 ppid=2095 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.333000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit: BPF prog-id=87 op=LOAD Dec 13 13:58:25.333000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdd966088 a2=94 a3=2 items=0 ppid=2095 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.333000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:25.333000 audit: BPF prog-id=87 op=UNLOAD Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.333000 audit: BPF prog-id=88 op=LOAD Dec 13 13:58:25.333000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdd966218 a2=94 a3=2d items=0 ppid=2095 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.333000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit: BPF prog-id=89 op=LOAD Dec 13 13:58:25.342000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff3243cc8 a2=98 a3=fffff3243cb8 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.342000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.342000 audit: BPF prog-id=89 op=UNLOAD Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit: BPF prog-id=90 op=LOAD Dec 13 13:58:25.342000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff3243958 a2=74 a3=95 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.342000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.342000 audit: BPF prog-id=90 op=UNLOAD Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.342000 audit: BPF prog-id=91 op=LOAD Dec 13 13:58:25.342000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff32439b8 a2=94 a3=2 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.342000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.342000 audit: BPF prog-id=91 op=UNLOAD Dec 13 13:58:25.427000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.427000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.427000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.427000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.427000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.427000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.427000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.427000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.427000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.427000 audit: BPF prog-id=92 op=LOAD Dec 13 13:58:25.427000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff3243978 a2=40 a3=fffff32439a8 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.427000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.427000 audit: BPF prog-id=92 op=UNLOAD Dec 13 13:58:25.427000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.427000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff3243a90 a2=50 a3=0 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.427000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff32439e8 a2=28 a3=fffff3243b18 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff3243a18 a2=28 a3=fffff3243b48 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff32438c8 a2=28 a3=fffff32439f8 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff3243a38 a2=28 a3=fffff3243b68 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff3243a18 a2=28 a3=fffff3243b48 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff3243a08 a2=28 a3=fffff3243b38 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff3243a38 a2=28 a3=fffff3243b68 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff3243a18 a2=28 a3=fffff3243b48 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff3243a38 a2=28 a3=fffff3243b68 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff3243a08 a2=28 a3=fffff3243b38 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff3243a88 a2=28 a3=fffff3243bc8 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff32437c0 a2=50 a3=0 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit: BPF prog-id=93 op=LOAD Dec 13 13:58:25.436000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff32437c8 a2=94 a3=5 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.436000 audit: BPF prog-id=93 op=UNLOAD Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff32438d0 a2=50 a3=0 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff3243a18 a2=4 a3=3 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { confidentiality } for pid=2274 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:58:25.436000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff32439f8 a2=94 a3=6 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.436000 audit[2274]: AVC avc: denied { confidentiality } for pid=2274 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:58:25.436000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff32431c8 a2=94 a3=83 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.436000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.437000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.437000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.437000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.437000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.437000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.437000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.437000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.437000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.437000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.437000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.437000 audit[2274]: AVC avc: denied { confidentiality } for pid=2274 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:58:25.437000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff32431c8 a2=94 a3=83 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.437000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.437000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.437000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff3244c08 a2=10 a3=fffff3244cf8 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.437000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.437000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.437000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff3244ac8 a2=10 a3=fffff3244bb8 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.437000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.437000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.437000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff3244a38 a2=10 a3=fffff3244bb8 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.437000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.437000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:25.437000 audit[2274]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff3244a38 a2=10 a3=fffff3244bb8 items=0 ppid=2095 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.437000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:58:25.453000 audit: BPF prog-id=88 op=UNLOAD Dec 13 13:58:25.499000 audit[2296]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:58:25.499000 audit[2296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffff076c580 a2=0 a3=ffffb74c5fa8 items=0 ppid=2095 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.499000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:58:25.508000 audit[2295]: NETFILTER_CFG table=raw:66 family=2 entries=21 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:58:25.508000 audit[2295]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=fffffc7dfe50 a2=0 a3=ffffbeac2fa8 items=0 ppid=2095 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.508000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:58:25.510000 audit[2300]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:58:25.510000 audit[2300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffecfa4730 a2=0 a3=ffff86771fa8 items=0 ppid=2095 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.510000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:58:25.512000 audit[2298]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:58:25.512000 audit[2298]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=fffff211e1f0 a2=0 a3=ffffbc783fa8 items=0 ppid=2095 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:25.512000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:58:26.061706 kubelet[1464]: E1213 13:58:26.061672 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:26.257282 kubelet[1464]: E1213 13:58:26.257245 1464 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:26.270413 systemd[1]: run-containerd-runc-k8s.io-af4f4396fa089c020631549ce2ea451b657c94f9cb1f3dfb5f7e2996d4a8e00c-runc.Pa0kR3.mount: Deactivated successfully. Dec 13 13:58:26.837000 audit[2330]: NETFILTER_CFG table=filter:69 family=2 entries=16 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:26.837000 audit[2330]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd2895c20 a2=0 a3=1 items=0 ppid=1686 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.837000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:26.846000 audit[2330]: NETFILTER_CFG table=nat:70 family=2 entries=14 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:26.846000 audit[2330]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffd2895c20 a2=0 a3=1 items=0 ppid=1686 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.846000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:26.857000 audit[2332]: NETFILTER_CFG table=filter:71 family=2 entries=13 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:26.857000 audit[2332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffee8bd3d0 a2=0 a3=1 items=0 ppid=1686 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.857000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:26.864000 audit[2332]: NETFILTER_CFG table=nat:72 family=2 entries=35 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:26.864000 audit[2332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffee8bd3d0 a2=0 a3=1 items=0 ppid=1686 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:26.864000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:27.062414 kubelet[1464]: E1213 13:58:27.062373 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:27.258872 kubelet[1464]: E1213 13:58:27.258453 1464 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:27.260873 systemd-networkd[1045]: vxlan.calico: Gained IPv6LL Dec 13 13:58:27.275300 systemd[1]: run-containerd-runc-k8s.io-af4f4396fa089c020631549ce2ea451b657c94f9cb1f3dfb5f7e2996d4a8e00c-runc.o7FQl5.mount: Deactivated successfully. Dec 13 13:58:28.062945 kubelet[1464]: E1213 13:58:28.062901 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:28.859000 audit[2362]: NETFILTER_CFG table=filter:73 family=2 entries=10 op=nft_register_rule pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:28.859000 audit[2362]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffedfd9420 a2=0 a3=1 items=0 ppid=1686 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:28.859000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:28.874000 audit[2362]: NETFILTER_CFG table=nat:74 family=2 entries=44 op=nft_register_rule pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:28.874000 audit[2362]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffedfd9420 a2=0 a3=1 items=0 ppid=1686 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:28.874000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:28.894000 audit[2364]: NETFILTER_CFG table=filter:75 family=2 entries=10 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:28.894000 audit[2364]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff2393900 a2=0 a3=1 items=0 ppid=1686 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:28.894000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:28.912000 audit[2364]: NETFILTER_CFG table=nat:76 family=2 entries=56 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:28.912000 audit[2364]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=fffff2393900 a2=0 a3=1 items=0 ppid=1686 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:28.912000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:29.063651 kubelet[1464]: E1213 13:58:29.063601 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:30.064570 kubelet[1464]: E1213 13:58:30.064527 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:31.051646 kubelet[1464]: E1213 13:58:31.051596 1464 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:31.064857 kubelet[1464]: E1213 13:58:31.064839 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:31.897137 kernel: kauditd_printk_skb: 572 callbacks suppressed Dec 13 13:58:31.897267 kernel: audit: type=1325 audit(1734098311.892:645): table=filter:77 family=2 entries=10 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:31.897292 kernel: audit: type=1300 audit(1734098311.892:645): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffab3d0f0 a2=0 a3=1 items=0 ppid=1686 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:31.892000 audit[2376]: NETFILTER_CFG table=filter:77 family=2 entries=10 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:31.892000 audit[2376]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffab3d0f0 a2=0 a3=1 items=0 ppid=1686 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:31.892000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:31.907816 kernel: audit: type=1327 audit(1734098311.892:645): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:31.909000 audit[2376]: NETFILTER_CFG table=nat:78 family=2 entries=20 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:31.909000 audit[2376]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffab3d0f0 a2=0 a3=1 items=0 ppid=1686 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:31.915808 kernel: audit: type=1325 audit(1734098311.909:646): table=nat:78 family=2 entries=20 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:31.915876 kernel: audit: type=1300 audit(1734098311.909:646): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffab3d0f0 a2=0 a3=1 items=0 ppid=1686 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:31.915898 kernel: audit: type=1327 audit(1734098311.909:646): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:31.909000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:32.065634 kubelet[1464]: E1213 13:58:32.065548 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:32.629000 audit[2380]: NETFILTER_CFG table=filter:79 family=2 entries=9 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:32.629000 audit[2380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffdfb014c0 a2=0 a3=1 items=0 ppid=1686 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:32.636901 kernel: audit: type=1325 audit(1734098312.629:647): table=filter:79 family=2 entries=9 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:32.636994 kernel: audit: type=1300 audit(1734098312.629:647): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffdfb014c0 a2=0 a3=1 items=0 ppid=1686 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:32.637019 kernel: audit: type=1327 audit(1734098312.629:647): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:32.629000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:32.641000 audit[2380]: NETFILTER_CFG table=nat:80 family=2 entries=27 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:32.641000 audit[2380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffdfb014c0 a2=0 a3=1 items=0 ppid=1686 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:32.641000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:32.645753 kernel: audit: type=1325 audit(1734098312.641:648): table=nat:80 family=2 entries=27 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:32.897000 audit[2382]: NETFILTER_CFG table=filter:81 family=2 entries=8 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:32.897000 audit[2382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd4697650 a2=0 a3=1 items=0 ppid=1686 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:32.897000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:32.908000 audit[2382]: NETFILTER_CFG table=nat:82 family=2 entries=30 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:32.908000 audit[2382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffd4697650 a2=0 a3=1 items=0 ppid=1686 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:32.908000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:33.066284 kubelet[1464]: E1213 13:58:33.066234 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:34.066807 kubelet[1464]: E1213 13:58:34.066766 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:34.224243 env[1214]: time="2024-12-13T13:58:34.224192805Z" level=info msg="StopPodSandbox for \"e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca\"" Dec 13 13:58:34.340212 env[1214]: 2024-12-13 13:58:34.266 [INFO][2398] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca" Dec 13 13:58:34.340212 env[1214]: 2024-12-13 13:58:34.267 [INFO][2398] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca" iface="eth0" netns="/var/run/netns/cni-27aecaee-b82b-13f5-ed98-5c9f2140b8a5" Dec 13 13:58:34.340212 env[1214]: 2024-12-13 13:58:34.267 [INFO][2398] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca" iface="eth0" netns="/var/run/netns/cni-27aecaee-b82b-13f5-ed98-5c9f2140b8a5" Dec 13 13:58:34.340212 env[1214]: 2024-12-13 13:58:34.267 [INFO][2398] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca" iface="eth0" netns="/var/run/netns/cni-27aecaee-b82b-13f5-ed98-5c9f2140b8a5" Dec 13 13:58:34.340212 env[1214]: 2024-12-13 13:58:34.267 [INFO][2398] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca" Dec 13 13:58:34.340212 env[1214]: 2024-12-13 13:58:34.267 [INFO][2398] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca" Dec 13 13:58:34.340212 env[1214]: 2024-12-13 13:58:34.327 [INFO][2406] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca" HandleID="k8s-pod-network.e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca" Workload="10.0.0.30-k8s-csi--node--driver--9f685-eth0" Dec 13 13:58:34.340212 env[1214]: 2024-12-13 13:58:34.327 [INFO][2406] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:34.340212 env[1214]: 2024-12-13 13:58:34.327 [INFO][2406] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:34.340212 env[1214]: 2024-12-13 13:58:34.335 [WARNING][2406] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca" HandleID="k8s-pod-network.e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca" Workload="10.0.0.30-k8s-csi--node--driver--9f685-eth0" Dec 13 13:58:34.340212 env[1214]: 2024-12-13 13:58:34.335 [INFO][2406] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca" HandleID="k8s-pod-network.e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca" Workload="10.0.0.30-k8s-csi--node--driver--9f685-eth0" Dec 13 13:58:34.340212 env[1214]: 2024-12-13 13:58:34.337 [INFO][2406] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:34.340212 env[1214]: 2024-12-13 13:58:34.338 [INFO][2398] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca" Dec 13 13:58:34.342195 systemd[1]: run-netns-cni\x2d27aecaee\x2db82b\x2d13f5\x2ded98\x2d5c9f2140b8a5.mount: Deactivated successfully. Dec 13 13:58:34.343020 env[1214]: time="2024-12-13T13:58:34.342194109Z" level=info msg="TearDown network for sandbox \"e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca\" successfully" Dec 13 13:58:34.343020 env[1214]: time="2024-12-13T13:58:34.342231258Z" level=info msg="StopPodSandbox for \"e5beb37368b81a33e20394d4df54f1d323cce9fdfdba53ff5d967c900410fdca\" returns successfully" Dec 13 13:58:34.343020 env[1214]: time="2024-12-13T13:58:34.342881030Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9f685,Uid:c6e23b73-823d-4a32-93af-7220cd7c628d,Namespace:calico-system,Attempt:1,}" Dec 13 13:58:34.453372 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 13:58:34.453475 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliba98f0adc79: link becomes ready Dec 13 13:58:34.453883 systemd-networkd[1045]: caliba98f0adc79: Link UP Dec 13 13:58:34.454022 systemd-networkd[1045]: caliba98f0adc79: Gained carrier Dec 13 13:58:34.465405 env[1214]: 2024-12-13 13:58:34.391 [INFO][2414] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.30-k8s-csi--node--driver--9f685-eth0 csi-node-driver- calico-system c6e23b73-823d-4a32-93af-7220cd7c628d 1046 0 2024-12-13 13:58:11 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.30 csi-node-driver-9f685 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] caliba98f0adc79 [] []}} ContainerID="2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9" Namespace="calico-system" Pod="csi-node-driver-9f685" WorkloadEndpoint="10.0.0.30-k8s-csi--node--driver--9f685-" Dec 13 13:58:34.465405 env[1214]: 2024-12-13 13:58:34.391 [INFO][2414] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9" Namespace="calico-system" Pod="csi-node-driver-9f685" WorkloadEndpoint="10.0.0.30-k8s-csi--node--driver--9f685-eth0" Dec 13 13:58:34.465405 env[1214]: 2024-12-13 13:58:34.414 [INFO][2426] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9" HandleID="k8s-pod-network.2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9" Workload="10.0.0.30-k8s-csi--node--driver--9f685-eth0" Dec 13 13:58:34.465405 env[1214]: 2024-12-13 13:58:34.424 [INFO][2426] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9" HandleID="k8s-pod-network.2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9" Workload="10.0.0.30-k8s-csi--node--driver--9f685-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d9170), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.30", "pod":"csi-node-driver-9f685", "timestamp":"2024-12-13 13:58:34.414374329 +0000 UTC"}, Hostname:"10.0.0.30", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 13:58:34.465405 env[1214]: 2024-12-13 13:58:34.425 [INFO][2426] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:34.465405 env[1214]: 2024-12-13 13:58:34.425 [INFO][2426] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:34.465405 env[1214]: 2024-12-13 13:58:34.425 [INFO][2426] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.30' Dec 13 13:58:34.465405 env[1214]: 2024-12-13 13:58:34.426 [INFO][2426] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9" host="10.0.0.30" Dec 13 13:58:34.465405 env[1214]: 2024-12-13 13:58:34.431 [INFO][2426] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.30" Dec 13 13:58:34.465405 env[1214]: 2024-12-13 13:58:34.435 [INFO][2426] ipam/ipam.go 489: Trying affinity for 192.168.125.0/26 host="10.0.0.30" Dec 13 13:58:34.465405 env[1214]: 2024-12-13 13:58:34.437 [INFO][2426] ipam/ipam.go 155: Attempting to load block cidr=192.168.125.0/26 host="10.0.0.30" Dec 13 13:58:34.465405 env[1214]: 2024-12-13 13:58:34.439 [INFO][2426] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.0/26 host="10.0.0.30" Dec 13 13:58:34.465405 env[1214]: 2024-12-13 13:58:34.439 [INFO][2426] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.0/26 handle="k8s-pod-network.2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9" host="10.0.0.30" Dec 13 13:58:34.465405 env[1214]: 2024-12-13 13:58:34.440 [INFO][2426] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9 Dec 13 13:58:34.465405 env[1214]: 2024-12-13 13:58:34.444 [INFO][2426] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.125.0/26 handle="k8s-pod-network.2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9" host="10.0.0.30" Dec 13 13:58:34.465405 env[1214]: 2024-12-13 13:58:34.448 [INFO][2426] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.125.1/26] block=192.168.125.0/26 handle="k8s-pod-network.2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9" host="10.0.0.30" Dec 13 13:58:34.465405 env[1214]: 2024-12-13 13:58:34.448 [INFO][2426] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.1/26] handle="k8s-pod-network.2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9" host="10.0.0.30" Dec 13 13:58:34.465405 env[1214]: 2024-12-13 13:58:34.449 [INFO][2426] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:34.465405 env[1214]: 2024-12-13 13:58:34.449 [INFO][2426] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.125.1/26] IPv6=[] ContainerID="2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9" HandleID="k8s-pod-network.2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9" Workload="10.0.0.30-k8s-csi--node--driver--9f685-eth0" Dec 13 13:58:34.465976 env[1214]: 2024-12-13 13:58:34.450 [INFO][2414] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9" Namespace="calico-system" Pod="csi-node-driver-9f685" WorkloadEndpoint="10.0.0.30-k8s-csi--node--driver--9f685-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-csi--node--driver--9f685-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c6e23b73-823d-4a32-93af-7220cd7c628d", ResourceVersion:"1046", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"", Pod:"csi-node-driver-9f685", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.125.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliba98f0adc79", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:34.465976 env[1214]: 2024-12-13 13:58:34.450 [INFO][2414] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.125.1/32] ContainerID="2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9" Namespace="calico-system" Pod="csi-node-driver-9f685" WorkloadEndpoint="10.0.0.30-k8s-csi--node--driver--9f685-eth0" Dec 13 13:58:34.465976 env[1214]: 2024-12-13 13:58:34.450 [INFO][2414] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliba98f0adc79 ContainerID="2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9" Namespace="calico-system" Pod="csi-node-driver-9f685" WorkloadEndpoint="10.0.0.30-k8s-csi--node--driver--9f685-eth0" Dec 13 13:58:34.465976 env[1214]: 2024-12-13 13:58:34.453 [INFO][2414] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9" Namespace="calico-system" Pod="csi-node-driver-9f685" WorkloadEndpoint="10.0.0.30-k8s-csi--node--driver--9f685-eth0" Dec 13 13:58:34.465976 env[1214]: 2024-12-13 13:58:34.453 [INFO][2414] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9" Namespace="calico-system" Pod="csi-node-driver-9f685" WorkloadEndpoint="10.0.0.30-k8s-csi--node--driver--9f685-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-csi--node--driver--9f685-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c6e23b73-823d-4a32-93af-7220cd7c628d", ResourceVersion:"1046", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9", Pod:"csi-node-driver-9f685", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.125.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliba98f0adc79", MAC:"0e:04:0c:30:2b:3d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:34.465976 env[1214]: 2024-12-13 13:58:34.462 [INFO][2414] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9" Namespace="calico-system" Pod="csi-node-driver-9f685" WorkloadEndpoint="10.0.0.30-k8s-csi--node--driver--9f685-eth0" Dec 13 13:58:34.470000 audit[2445]: NETFILTER_CFG table=filter:83 family=2 entries=34 op=nft_register_chain pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:58:34.470000 audit[2445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffe9fcf880 a2=0 a3=ffff9dc03fa8 items=0 ppid=2095 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:34.470000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:58:34.478570 env[1214]: time="2024-12-13T13:58:34.478463458Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:58:34.478570 env[1214]: time="2024-12-13T13:58:34.478506010Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:58:34.478570 env[1214]: time="2024-12-13T13:58:34.478516778Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:58:34.478834 env[1214]: time="2024-12-13T13:58:34.478646476Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9 pid=2457 runtime=io.containerd.runc.v2 Dec 13 13:58:34.489659 systemd[1]: Started cri-containerd-2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9.scope. Dec 13 13:58:34.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit: BPF prog-id=94 op=LOAD Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2457 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:34.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261326535663134643063323464346132636431396335353039346561 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2457 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:34.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261326535663134643063323464346132636431396335353039346561 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit: BPF prog-id=95 op=LOAD Dec 13 13:58:34.504000 audit[2468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2457 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:34.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261326535663134643063323464346132636431396335353039346561 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit: BPF prog-id=96 op=LOAD Dec 13 13:58:34.504000 audit[2468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2457 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:34.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261326535663134643063323464346132636431396335353039346561 Dec 13 13:58:34.504000 audit: BPF prog-id=96 op=UNLOAD Dec 13 13:58:34.504000 audit: BPF prog-id=95 op=UNLOAD Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { perfmon } for pid=2468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit[2468]: AVC avc: denied { bpf } for pid=2468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:34.504000 audit: BPF prog-id=97 op=LOAD Dec 13 13:58:34.504000 audit[2468]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2457 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:34.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261326535663134643063323464346132636431396335353039346561 Dec 13 13:58:34.507137 systemd-resolved[1159]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 13:58:34.519075 env[1214]: time="2024-12-13T13:58:34.519031481Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9f685,Uid:c6e23b73-823d-4a32-93af-7220cd7c628d,Namespace:calico-system,Attempt:1,} returns sandbox id \"2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9\"" Dec 13 13:58:34.520637 env[1214]: time="2024-12-13T13:58:34.520603632Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 13:58:35.067336 kubelet[1464]: E1213 13:58:35.067303 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:35.456157 env[1214]: time="2024-12-13T13:58:35.456051889Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:35.458064 env[1214]: time="2024-12-13T13:58:35.458027900Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:35.459607 env[1214]: time="2024-12-13T13:58:35.459581553Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:35.461034 env[1214]: time="2024-12-13T13:58:35.460998824Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:35.461609 env[1214]: time="2024-12-13T13:58:35.461583430Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163\"" Dec 13 13:58:35.463722 env[1214]: time="2024-12-13T13:58:35.463693981Z" level=info msg="CreateContainer within sandbox \"2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 13:58:35.474964 env[1214]: time="2024-12-13T13:58:35.474921593Z" level=info msg="CreateContainer within sandbox \"2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"094211356b140c144faebb05dee79af22db13bfee301e2348d0e4a92cd307546\"" Dec 13 13:58:35.475675 env[1214]: time="2024-12-13T13:58:35.475639418Z" level=info msg="StartContainer for \"094211356b140c144faebb05dee79af22db13bfee301e2348d0e4a92cd307546\"" Dec 13 13:58:35.491326 systemd[1]: Started cri-containerd-094211356b140c144faebb05dee79af22db13bfee301e2348d0e4a92cd307546.scope. Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2457 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:35.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039343231313335366231343063313434666165626230356465653739 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit: BPF prog-id=98 op=LOAD Dec 13 13:58:35.511000 audit[2497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2457 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:35.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039343231313335366231343063313434666165626230356465653739 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit: BPF prog-id=99 op=LOAD Dec 13 13:58:35.511000 audit[2497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2457 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:35.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039343231313335366231343063313434666165626230356465653739 Dec 13 13:58:35.511000 audit: BPF prog-id=99 op=UNLOAD Dec 13 13:58:35.511000 audit: BPF prog-id=98 op=UNLOAD Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:35.511000 audit: BPF prog-id=100 op=LOAD Dec 13 13:58:35.511000 audit[2497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2457 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:35.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039343231313335366231343063313434666165626230356465653739 Dec 13 13:58:35.525974 env[1214]: time="2024-12-13T13:58:35.525926810Z" level=info msg="StartContainer for \"094211356b140c144faebb05dee79af22db13bfee301e2348d0e4a92cd307546\" returns successfully" Dec 13 13:58:35.527224 env[1214]: time="2024-12-13T13:58:35.527180391Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 13:58:35.643920 systemd-networkd[1045]: caliba98f0adc79: Gained IPv6LL Dec 13 13:58:36.067641 kubelet[1464]: E1213 13:58:36.067593 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:36.478328 env[1214]: time="2024-12-13T13:58:36.478221332Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:36.479705 env[1214]: time="2024-12-13T13:58:36.479667630Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:36.481098 env[1214]: time="2024-12-13T13:58:36.481071806Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:36.482627 env[1214]: time="2024-12-13T13:58:36.482596541Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:36.483162 env[1214]: time="2024-12-13T13:58:36.483133788Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349\"" Dec 13 13:58:36.484809 env[1214]: time="2024-12-13T13:58:36.484774156Z" level=info msg="CreateContainer within sandbox \"2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 13:58:36.494819 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1841615928.mount: Deactivated successfully. Dec 13 13:58:36.497637 env[1214]: time="2024-12-13T13:58:36.497588677Z" level=info msg="CreateContainer within sandbox \"2a2e5f14d0c24d4a2cd19c55094eaece7929895913816624e1894090b48378d9\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"3133dd0d7cdd739b3a2eb767d7a4990b051b1dcc92cbb3096ef0116068a308d8\"" Dec 13 13:58:36.498060 env[1214]: time="2024-12-13T13:58:36.498038318Z" level=info msg="StartContainer for \"3133dd0d7cdd739b3a2eb767d7a4990b051b1dcc92cbb3096ef0116068a308d8\"" Dec 13 13:58:36.514411 systemd[1]: Started cri-containerd-3133dd0d7cdd739b3a2eb767d7a4990b051b1dcc92cbb3096ef0116068a308d8.scope. Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2457 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:36.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331333364643064376364643733396233613265623736376437613439 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit: BPF prog-id=101 op=LOAD Dec 13 13:58:36.534000 audit[2537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2457 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:36.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331333364643064376364643733396233613265623736376437613439 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit: BPF prog-id=102 op=LOAD Dec 13 13:58:36.534000 audit[2537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2457 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:36.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331333364643064376364643733396233613265623736376437613439 Dec 13 13:58:36.534000 audit: BPF prog-id=102 op=UNLOAD Dec 13 13:58:36.534000 audit: BPF prog-id=101 op=UNLOAD Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { perfmon } for pid=2537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit[2537]: AVC avc: denied { bpf } for pid=2537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:36.534000 audit: BPF prog-id=103 op=LOAD Dec 13 13:58:36.534000 audit[2537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2457 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:36.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331333364643064376364643733396233613265623736376437613439 Dec 13 13:58:36.548629 env[1214]: time="2024-12-13T13:58:36.548582704Z" level=info msg="StartContainer for \"3133dd0d7cdd739b3a2eb767d7a4990b051b1dcc92cbb3096ef0116068a308d8\" returns successfully" Dec 13 13:58:37.068503 kubelet[1464]: E1213 13:58:37.068468 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:37.198160 kubelet[1464]: I1213 13:58:37.197861 1464 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 13:58:37.198160 kubelet[1464]: I1213 13:58:37.197889 1464 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 13:58:37.292374 kubelet[1464]: I1213 13:58:37.292329 1464 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-9f685" podStartSLOduration=24.328958844 podStartE2EDuration="26.292292362s" podCreationTimestamp="2024-12-13 13:58:11 +0000 UTC" firstStartedPulling="2024-12-13 13:58:34.520131194 +0000 UTC m=+24.152073692" lastFinishedPulling="2024-12-13 13:58:36.483464712 +0000 UTC m=+26.115407210" observedRunningTime="2024-12-13 13:58:37.290418667 +0000 UTC m=+26.922361165" watchObservedRunningTime="2024-12-13 13:58:37.292292362 +0000 UTC m=+26.924234860" Dec 13 13:58:38.069463 kubelet[1464]: E1213 13:58:38.069413 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:38.224152 env[1214]: time="2024-12-13T13:58:38.224105964Z" level=info msg="StopPodSandbox for \"d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9\"" Dec 13 13:58:38.296995 env[1214]: 2024-12-13 13:58:38.263 [INFO][2582] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9" Dec 13 13:58:38.296995 env[1214]: 2024-12-13 13:58:38.263 [INFO][2582] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9" iface="eth0" netns="/var/run/netns/cni-24cd61d5-a4e1-c1eb-613b-9c8fe44a8ae6" Dec 13 13:58:38.296995 env[1214]: 2024-12-13 13:58:38.263 [INFO][2582] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9" iface="eth0" netns="/var/run/netns/cni-24cd61d5-a4e1-c1eb-613b-9c8fe44a8ae6" Dec 13 13:58:38.296995 env[1214]: 2024-12-13 13:58:38.264 [INFO][2582] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9" iface="eth0" netns="/var/run/netns/cni-24cd61d5-a4e1-c1eb-613b-9c8fe44a8ae6" Dec 13 13:58:38.296995 env[1214]: 2024-12-13 13:58:38.264 [INFO][2582] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9" Dec 13 13:58:38.296995 env[1214]: 2024-12-13 13:58:38.264 [INFO][2582] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9" Dec 13 13:58:38.296995 env[1214]: 2024-12-13 13:58:38.284 [INFO][2589] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9" HandleID="k8s-pod-network.d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9" Workload="10.0.0.30-k8s-nginx--deployment--6d5f899847--swrch-eth0" Dec 13 13:58:38.296995 env[1214]: 2024-12-13 13:58:38.284 [INFO][2589] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:38.296995 env[1214]: 2024-12-13 13:58:38.284 [INFO][2589] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:38.296995 env[1214]: 2024-12-13 13:58:38.293 [WARNING][2589] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9" HandleID="k8s-pod-network.d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9" Workload="10.0.0.30-k8s-nginx--deployment--6d5f899847--swrch-eth0" Dec 13 13:58:38.296995 env[1214]: 2024-12-13 13:58:38.293 [INFO][2589] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9" HandleID="k8s-pod-network.d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9" Workload="10.0.0.30-k8s-nginx--deployment--6d5f899847--swrch-eth0" Dec 13 13:58:38.296995 env[1214]: 2024-12-13 13:58:38.294 [INFO][2589] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:38.296995 env[1214]: 2024-12-13 13:58:38.295 [INFO][2582] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9" Dec 13 13:58:38.298187 env[1214]: time="2024-12-13T13:58:38.298151919Z" level=info msg="TearDown network for sandbox \"d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9\" successfully" Dec 13 13:58:38.298268 env[1214]: time="2024-12-13T13:58:38.298253128Z" level=info msg="StopPodSandbox for \"d9059cea1dcac3b552ad59a5adea72f821fc58da1b56ae5141376b83f267edb9\" returns successfully" Dec 13 13:58:38.298665 systemd[1]: run-netns-cni\x2d24cd61d5\x2da4e1\x2dc1eb\x2d613b\x2d9c8fe44a8ae6.mount: Deactivated successfully. Dec 13 13:58:38.299151 env[1214]: time="2024-12-13T13:58:38.299122129Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-swrch,Uid:3c2bb878-f4b5-4fcb-9cec-6dbf34ef4a9b,Namespace:default,Attempt:1,}" Dec 13 13:58:38.401589 systemd-networkd[1045]: calid8351d94e91: Link UP Dec 13 13:58:38.403368 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 13:58:38.403414 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid8351d94e91: link becomes ready Dec 13 13:58:38.403295 systemd-networkd[1045]: calid8351d94e91: Gained carrier Dec 13 13:58:38.414083 env[1214]: 2024-12-13 13:58:38.341 [INFO][2597] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.30-k8s-nginx--deployment--6d5f899847--swrch-eth0 nginx-deployment-6d5f899847- default 3c2bb878-f4b5-4fcb-9cec-6dbf34ef4a9b 1072 0 2024-12-13 13:58:23 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.30 nginx-deployment-6d5f899847-swrch eth0 default [] [] [kns.default ksa.default.default] calid8351d94e91 [] []}} ContainerID="7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570" Namespace="default" Pod="nginx-deployment-6d5f899847-swrch" WorkloadEndpoint="10.0.0.30-k8s-nginx--deployment--6d5f899847--swrch-" Dec 13 13:58:38.414083 env[1214]: 2024-12-13 13:58:38.341 [INFO][2597] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570" Namespace="default" Pod="nginx-deployment-6d5f899847-swrch" WorkloadEndpoint="10.0.0.30-k8s-nginx--deployment--6d5f899847--swrch-eth0" Dec 13 13:58:38.414083 env[1214]: 2024-12-13 13:58:38.363 [INFO][2612] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570" HandleID="k8s-pod-network.7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570" Workload="10.0.0.30-k8s-nginx--deployment--6d5f899847--swrch-eth0" Dec 13 13:58:38.414083 env[1214]: 2024-12-13 13:58:38.374 [INFO][2612] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570" HandleID="k8s-pod-network.7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570" Workload="10.0.0.30-k8s-nginx--deployment--6d5f899847--swrch-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002e5da0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.30", "pod":"nginx-deployment-6d5f899847-swrch", "timestamp":"2024-12-13 13:58:38.363670688 +0000 UTC"}, Hostname:"10.0.0.30", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 13:58:38.414083 env[1214]: 2024-12-13 13:58:38.374 [INFO][2612] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:38.414083 env[1214]: 2024-12-13 13:58:38.374 [INFO][2612] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:38.414083 env[1214]: 2024-12-13 13:58:38.374 [INFO][2612] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.30' Dec 13 13:58:38.414083 env[1214]: 2024-12-13 13:58:38.376 [INFO][2612] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570" host="10.0.0.30" Dec 13 13:58:38.414083 env[1214]: 2024-12-13 13:58:38.380 [INFO][2612] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.30" Dec 13 13:58:38.414083 env[1214]: 2024-12-13 13:58:38.384 [INFO][2612] ipam/ipam.go 489: Trying affinity for 192.168.125.0/26 host="10.0.0.30" Dec 13 13:58:38.414083 env[1214]: 2024-12-13 13:58:38.386 [INFO][2612] ipam/ipam.go 155: Attempting to load block cidr=192.168.125.0/26 host="10.0.0.30" Dec 13 13:58:38.414083 env[1214]: 2024-12-13 13:58:38.387 [INFO][2612] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.0/26 host="10.0.0.30" Dec 13 13:58:38.414083 env[1214]: 2024-12-13 13:58:38.388 [INFO][2612] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.0/26 handle="k8s-pod-network.7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570" host="10.0.0.30" Dec 13 13:58:38.414083 env[1214]: 2024-12-13 13:58:38.389 [INFO][2612] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570 Dec 13 13:58:38.414083 env[1214]: 2024-12-13 13:58:38.392 [INFO][2612] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.125.0/26 handle="k8s-pod-network.7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570" host="10.0.0.30" Dec 13 13:58:38.414083 env[1214]: 2024-12-13 13:58:38.397 [INFO][2612] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.125.2/26] block=192.168.125.0/26 handle="k8s-pod-network.7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570" host="10.0.0.30" Dec 13 13:58:38.414083 env[1214]: 2024-12-13 13:58:38.397 [INFO][2612] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.2/26] handle="k8s-pod-network.7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570" host="10.0.0.30" Dec 13 13:58:38.414083 env[1214]: 2024-12-13 13:58:38.397 [INFO][2612] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:38.414083 env[1214]: 2024-12-13 13:58:38.397 [INFO][2612] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.125.2/26] IPv6=[] ContainerID="7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570" HandleID="k8s-pod-network.7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570" Workload="10.0.0.30-k8s-nginx--deployment--6d5f899847--swrch-eth0" Dec 13 13:58:38.414741 env[1214]: 2024-12-13 13:58:38.399 [INFO][2597] cni-plugin/k8s.go 386: Populated endpoint ContainerID="7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570" Namespace="default" Pod="nginx-deployment-6d5f899847-swrch" WorkloadEndpoint="10.0.0.30-k8s-nginx--deployment--6d5f899847--swrch-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-nginx--deployment--6d5f899847--swrch-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"3c2bb878-f4b5-4fcb-9cec-6dbf34ef4a9b", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"", Pod:"nginx-deployment-6d5f899847-swrch", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calid8351d94e91", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:38.414741 env[1214]: 2024-12-13 13:58:38.399 [INFO][2597] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.125.2/32] ContainerID="7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570" Namespace="default" Pod="nginx-deployment-6d5f899847-swrch" WorkloadEndpoint="10.0.0.30-k8s-nginx--deployment--6d5f899847--swrch-eth0" Dec 13 13:58:38.414741 env[1214]: 2024-12-13 13:58:38.399 [INFO][2597] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid8351d94e91 ContainerID="7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570" Namespace="default" Pod="nginx-deployment-6d5f899847-swrch" WorkloadEndpoint="10.0.0.30-k8s-nginx--deployment--6d5f899847--swrch-eth0" Dec 13 13:58:38.414741 env[1214]: 2024-12-13 13:58:38.403 [INFO][2597] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570" Namespace="default" Pod="nginx-deployment-6d5f899847-swrch" WorkloadEndpoint="10.0.0.30-k8s-nginx--deployment--6d5f899847--swrch-eth0" Dec 13 13:58:38.414741 env[1214]: 2024-12-13 13:58:38.403 [INFO][2597] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570" Namespace="default" Pod="nginx-deployment-6d5f899847-swrch" WorkloadEndpoint="10.0.0.30-k8s-nginx--deployment--6d5f899847--swrch-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-nginx--deployment--6d5f899847--swrch-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"3c2bb878-f4b5-4fcb-9cec-6dbf34ef4a9b", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570", Pod:"nginx-deployment-6d5f899847-swrch", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calid8351d94e91", MAC:"2e:7a:f9:a1:86:76", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:38.414741 env[1214]: 2024-12-13 13:58:38.411 [INFO][2597] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570" Namespace="default" Pod="nginx-deployment-6d5f899847-swrch" WorkloadEndpoint="10.0.0.30-k8s-nginx--deployment--6d5f899847--swrch-eth0" Dec 13 13:58:38.421000 audit[2636]: NETFILTER_CFG table=filter:84 family=2 entries=38 op=nft_register_chain pid=2636 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:58:38.424690 kernel: kauditd_printk_skb: 154 callbacks suppressed Dec 13 13:58:38.424790 kernel: audit: type=1325 audit(1734098318.421:682): table=filter:84 family=2 entries=38 op=nft_register_chain pid=2636 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:58:38.424829 kernel: audit: type=1300 audit(1734098318.421:682): arch=c00000b7 syscall=211 success=yes exit=20312 a0=3 a1=ffffe32e5360 a2=0 a3=ffff98725fa8 items=0 ppid=2095 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:38.421000 audit[2636]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20312 a0=3 a1=ffffe32e5360 a2=0 a3=ffff98725fa8 items=0 ppid=2095 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:38.425650 env[1214]: time="2024-12-13T13:58:38.425569447Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:58:38.425650 env[1214]: time="2024-12-13T13:58:38.425626017Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:58:38.425650 env[1214]: time="2024-12-13T13:58:38.425642591Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:58:38.425880 env[1214]: time="2024-12-13T13:58:38.425854577Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570 pid=2644 runtime=io.containerd.runc.v2 Dec 13 13:58:38.421000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:58:38.431483 kernel: audit: type=1327 audit(1734098318.421:682): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:58:38.438715 systemd[1]: Started cri-containerd-7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570.scope. Dec 13 13:58:38.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.467198 kernel: audit: type=1400 audit(1734098318.462:683): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.467266 kernel: audit: type=1400 audit(1734098318.462:684): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.467300 kernel: audit: type=1400 audit(1734098318.462:685): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.468863 kernel: audit: type=1400 audit(1734098318.462:686): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.470613 kernel: audit: type=1400 audit(1734098318.462:687): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.474161 kernel: audit: type=1400 audit(1734098318.462:688): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.474210 kernel: audit: type=1400 audit(1734098318.462:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.464000 audit: BPF prog-id=104 op=LOAD Dec 13 13:58:38.465000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.465000 audit[2653]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2644 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:38.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731343265623337643334653633373265353238613338343532653836 Dec 13 13:58:38.465000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.465000 audit[2653]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2644 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:38.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731343265623337643334653633373265353238613338343532653836 Dec 13 13:58:38.465000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.465000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.465000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.465000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.465000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.465000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.465000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.465000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.465000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.465000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.465000 audit: BPF prog-id=105 op=LOAD Dec 13 13:58:38.465000 audit[2653]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2644 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:38.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731343265623337643334653633373265353238613338343532653836 Dec 13 13:58:38.466000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.466000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.466000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.466000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.466000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.466000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.466000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.466000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.466000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.466000 audit: BPF prog-id=106 op=LOAD Dec 13 13:58:38.466000 audit[2653]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2644 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:38.466000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731343265623337643334653633373265353238613338343532653836 Dec 13 13:58:38.468000 audit: BPF prog-id=106 op=UNLOAD Dec 13 13:58:38.468000 audit: BPF prog-id=105 op=UNLOAD Dec 13 13:58:38.468000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.468000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.468000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.468000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.468000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.468000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.468000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.468000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.468000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.468000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:38.468000 audit: BPF prog-id=107 op=LOAD Dec 13 13:58:38.468000 audit[2653]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2644 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:38.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731343265623337643334653633373265353238613338343532653836 Dec 13 13:58:38.476013 systemd-resolved[1159]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 13:58:38.492193 env[1214]: time="2024-12-13T13:58:38.492152508Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-swrch,Uid:3c2bb878-f4b5-4fcb-9cec-6dbf34ef4a9b,Namespace:default,Attempt:1,} returns sandbox id \"7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570\"" Dec 13 13:58:38.493825 env[1214]: time="2024-12-13T13:58:38.493714155Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 13:58:39.069806 kubelet[1464]: E1213 13:58:39.069716 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:39.548159 systemd-networkd[1045]: calid8351d94e91: Gained IPv6LL Dec 13 13:58:40.070348 kubelet[1464]: E1213 13:58:40.070317 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:40.322028 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1724350853.mount: Deactivated successfully. Dec 13 13:58:41.071035 kubelet[1464]: E1213 13:58:41.070993 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:41.608712 env[1214]: time="2024-12-13T13:58:41.608643294Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:41.609686 env[1214]: time="2024-12-13T13:58:41.609665052Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:41.611474 env[1214]: time="2024-12-13T13:58:41.611447935Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:41.612886 env[1214]: time="2024-12-13T13:58:41.612860302Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:41.614378 env[1214]: time="2024-12-13T13:58:41.614348126Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de\"" Dec 13 13:58:41.616124 env[1214]: time="2024-12-13T13:58:41.616093821Z" level=info msg="CreateContainer within sandbox \"7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 13:58:41.625582 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount942134078.mount: Deactivated successfully. Dec 13 13:58:41.629121 env[1214]: time="2024-12-13T13:58:41.629075172Z" level=info msg="CreateContainer within sandbox \"7142eb37d34e6372e528a38452e8644568d7e8549f83e80f25db9f1834db3570\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"60b3d5419b2edd4b96ac26c5186d2e8e2cbe35085e3bd9e094bb8273810139e6\"" Dec 13 13:58:41.629804 env[1214]: time="2024-12-13T13:58:41.629766005Z" level=info msg="StartContainer for \"60b3d5419b2edd4b96ac26c5186d2e8e2cbe35085e3bd9e094bb8273810139e6\"" Dec 13 13:58:41.649789 systemd[1]: Started cri-containerd-60b3d5419b2edd4b96ac26c5186d2e8e2cbe35085e3bd9e094bb8273810139e6.scope. Dec 13 13:58:41.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit: BPF prog-id=108 op=LOAD Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2644 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:41.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630623364353431396232656464346239366163323663353138366432 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2644 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:41.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630623364353431396232656464346239366163323663353138366432 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit: BPF prog-id=109 op=LOAD Dec 13 13:58:41.681000 audit[2689]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2644 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:41.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630623364353431396232656464346239366163323663353138366432 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit: BPF prog-id=110 op=LOAD Dec 13 13:58:41.681000 audit[2689]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2644 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:41.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630623364353431396232656464346239366163323663353138366432 Dec 13 13:58:41.681000 audit: BPF prog-id=110 op=UNLOAD Dec 13 13:58:41.681000 audit: BPF prog-id=109 op=UNLOAD Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { perfmon } for pid=2689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit[2689]: AVC avc: denied { bpf } for pid=2689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:41.681000 audit: BPF prog-id=111 op=LOAD Dec 13 13:58:41.681000 audit[2689]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2644 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:41.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630623364353431396232656464346239366163323663353138366432 Dec 13 13:58:41.697257 env[1214]: time="2024-12-13T13:58:41.697214764Z" level=info msg="StartContainer for \"60b3d5419b2edd4b96ac26c5186d2e8e2cbe35085e3bd9e094bb8273810139e6\" returns successfully" Dec 13 13:58:42.071553 kubelet[1464]: E1213 13:58:42.071525 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:42.315579 kubelet[1464]: I1213 13:58:42.315548 1464 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-swrch" podStartSLOduration=16.194000218 podStartE2EDuration="19.315507346s" podCreationTimestamp="2024-12-13 13:58:23 +0000 UTC" firstStartedPulling="2024-12-13 13:58:38.493198984 +0000 UTC m=+28.125141442" lastFinishedPulling="2024-12-13 13:58:41.614706032 +0000 UTC m=+31.246648570" observedRunningTime="2024-12-13 13:58:42.315420645 +0000 UTC m=+31.947363143" watchObservedRunningTime="2024-12-13 13:58:42.315507346 +0000 UTC m=+31.947449844" Dec 13 13:58:42.623702 systemd[1]: run-containerd-runc-k8s.io-60b3d5419b2edd4b96ac26c5186d2e8e2cbe35085e3bd9e094bb8273810139e6-runc.9Tfiwg.mount: Deactivated successfully. Dec 13 13:58:43.031000 audit[2740]: NETFILTER_CFG table=filter:85 family=2 entries=8 op=nft_register_rule pid=2740 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:43.031000 audit[2740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffde2740c0 a2=0 a3=1 items=0 ppid=1686 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:43.031000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:43.043000 audit[2740]: NETFILTER_CFG table=nat:86 family=2 entries=34 op=nft_register_chain pid=2740 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:43.043000 audit[2740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffde2740c0 a2=0 a3=1 items=0 ppid=1686 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:43.043000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:43.071977 kubelet[1464]: E1213 13:58:43.071924 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:44.072611 kubelet[1464]: E1213 13:58:44.072546 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:45.076198 kubelet[1464]: E1213 13:58:45.076152 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:45.986000 audit[2750]: NETFILTER_CFG table=filter:87 family=2 entries=20 op=nft_register_rule pid=2750 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:45.988156 kernel: kauditd_printk_skb: 113 callbacks suppressed Dec 13 13:58:45.988214 kernel: audit: type=1325 audit(1734098325.986:721): table=filter:87 family=2 entries=20 op=nft_register_rule pid=2750 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:45.986000 audit[2750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffef5baa10 a2=0 a3=1 items=0 ppid=1686 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:45.992410 kernel: audit: type=1300 audit(1734098325.986:721): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffef5baa10 a2=0 a3=1 items=0 ppid=1686 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:45.992484 kernel: audit: type=1327 audit(1734098325.986:721): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:45.986000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:45.994000 audit[2750]: NETFILTER_CFG table=nat:88 family=2 entries=22 op=nft_register_rule pid=2750 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:45.994000 audit[2750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffef5baa10 a2=0 a3=1 items=0 ppid=1686 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:45.999421 kernel: audit: type=1325 audit(1734098325.994:722): table=nat:88 family=2 entries=22 op=nft_register_rule pid=2750 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:45.999470 kernel: audit: type=1300 audit(1734098325.994:722): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffef5baa10 a2=0 a3=1 items=0 ppid=1686 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:45.999499 kernel: audit: type=1327 audit(1734098325.994:722): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:45.994000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:46.007000 audit[2752]: NETFILTER_CFG table=filter:89 family=2 entries=32 op=nft_register_rule pid=2752 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:46.007000 audit[2752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffff177080 a2=0 a3=1 items=0 ppid=1686 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:46.012490 kernel: audit: type=1325 audit(1734098326.007:723): table=filter:89 family=2 entries=32 op=nft_register_rule pid=2752 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:46.012540 kernel: audit: type=1300 audit(1734098326.007:723): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffff177080 a2=0 a3=1 items=0 ppid=1686 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:46.012562 kernel: audit: type=1327 audit(1734098326.007:723): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:46.007000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:46.017000 audit[2752]: NETFILTER_CFG table=nat:90 family=2 entries=22 op=nft_register_rule pid=2752 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:46.017000 audit[2752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffff177080 a2=0 a3=1 items=0 ppid=1686 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:46.017000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:46.020749 kernel: audit: type=1325 audit(1734098326.017:724): table=nat:90 family=2 entries=22 op=nft_register_rule pid=2752 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:46.048362 kubelet[1464]: I1213 13:58:46.048313 1464 topology_manager.go:215] "Topology Admit Handler" podUID="52e4cefd-ebf8-44f3-986c-8d04d554abb5" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 13:58:46.054848 systemd[1]: Created slice kubepods-besteffort-pod52e4cefd_ebf8_44f3_986c_8d04d554abb5.slice. Dec 13 13:58:46.076970 kubelet[1464]: E1213 13:58:46.076919 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:46.165431 kubelet[1464]: I1213 13:58:46.165365 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/52e4cefd-ebf8-44f3-986c-8d04d554abb5-data\") pod \"nfs-server-provisioner-0\" (UID: \"52e4cefd-ebf8-44f3-986c-8d04d554abb5\") " pod="default/nfs-server-provisioner-0" Dec 13 13:58:46.165431 kubelet[1464]: I1213 13:58:46.165428 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vqgdp\" (UniqueName: \"kubernetes.io/projected/52e4cefd-ebf8-44f3-986c-8d04d554abb5-kube-api-access-vqgdp\") pod \"nfs-server-provisioner-0\" (UID: \"52e4cefd-ebf8-44f3-986c-8d04d554abb5\") " pod="default/nfs-server-provisioner-0" Dec 13 13:58:46.358772 env[1214]: time="2024-12-13T13:58:46.358688790Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:52e4cefd-ebf8-44f3-986c-8d04d554abb5,Namespace:default,Attempt:0,}" Dec 13 13:58:46.491383 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 13:58:46.491517 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 13:58:46.491692 systemd-networkd[1045]: cali60e51b789ff: Link UP Dec 13 13:58:46.491839 systemd-networkd[1045]: cali60e51b789ff: Gained carrier Dec 13 13:58:46.510027 env[1214]: 2024-12-13 13:58:46.413 [INFO][2754] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.30-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 52e4cefd-ebf8-44f3-986c-8d04d554abb5 1125 0 2024-12-13 13:58:46 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.30 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.30-k8s-nfs--server--provisioner--0-" Dec 13 13:58:46.510027 env[1214]: 2024-12-13 13:58:46.413 [INFO][2754] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" Dec 13 13:58:46.510027 env[1214]: 2024-12-13 13:58:46.438 [INFO][2767] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0" HandleID="k8s-pod-network.96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0" Workload="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" Dec 13 13:58:46.510027 env[1214]: 2024-12-13 13:58:46.453 [INFO][2767] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0" HandleID="k8s-pod-network.96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0" Workload="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000304160), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.30", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 13:58:46.438844093 +0000 UTC"}, Hostname:"10.0.0.30", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 13:58:46.510027 env[1214]: 2024-12-13 13:58:46.453 [INFO][2767] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:58:46.510027 env[1214]: 2024-12-13 13:58:46.453 [INFO][2767] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:58:46.510027 env[1214]: 2024-12-13 13:58:46.453 [INFO][2767] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.30' Dec 13 13:58:46.510027 env[1214]: 2024-12-13 13:58:46.455 [INFO][2767] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0" host="10.0.0.30" Dec 13 13:58:46.510027 env[1214]: 2024-12-13 13:58:46.461 [INFO][2767] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.30" Dec 13 13:58:46.510027 env[1214]: 2024-12-13 13:58:46.467 [INFO][2767] ipam/ipam.go 489: Trying affinity for 192.168.125.0/26 host="10.0.0.30" Dec 13 13:58:46.510027 env[1214]: 2024-12-13 13:58:46.469 [INFO][2767] ipam/ipam.go 155: Attempting to load block cidr=192.168.125.0/26 host="10.0.0.30" Dec 13 13:58:46.510027 env[1214]: 2024-12-13 13:58:46.472 [INFO][2767] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.0/26 host="10.0.0.30" Dec 13 13:58:46.510027 env[1214]: 2024-12-13 13:58:46.472 [INFO][2767] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.0/26 handle="k8s-pod-network.96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0" host="10.0.0.30" Dec 13 13:58:46.510027 env[1214]: 2024-12-13 13:58:46.474 [INFO][2767] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0 Dec 13 13:58:46.510027 env[1214]: 2024-12-13 13:58:46.479 [INFO][2767] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.125.0/26 handle="k8s-pod-network.96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0" host="10.0.0.30" Dec 13 13:58:46.510027 env[1214]: 2024-12-13 13:58:46.485 [INFO][2767] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.125.3/26] block=192.168.125.0/26 handle="k8s-pod-network.96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0" host="10.0.0.30" Dec 13 13:58:46.510027 env[1214]: 2024-12-13 13:58:46.485 [INFO][2767] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.3/26] handle="k8s-pod-network.96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0" host="10.0.0.30" Dec 13 13:58:46.510027 env[1214]: 2024-12-13 13:58:46.485 [INFO][2767] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:58:46.510027 env[1214]: 2024-12-13 13:58:46.485 [INFO][2767] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.125.3/26] IPv6=[] ContainerID="96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0" HandleID="k8s-pod-network.96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0" Workload="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" Dec 13 13:58:46.513168 env[1214]: 2024-12-13 13:58:46.487 [INFO][2754] cni-plugin/k8s.go 386: Populated endpoint ContainerID="96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"52e4cefd-ebf8-44f3-986c-8d04d554abb5", ResourceVersion:"1125", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.125.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:46.513168 env[1214]: 2024-12-13 13:58:46.487 [INFO][2754] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.125.3/32] ContainerID="96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" Dec 13 13:58:46.513168 env[1214]: 2024-12-13 13:58:46.487 [INFO][2754] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" Dec 13 13:58:46.513168 env[1214]: 2024-12-13 13:58:46.491 [INFO][2754] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" Dec 13 13:58:46.513323 env[1214]: 2024-12-13 13:58:46.493 [INFO][2754] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"52e4cefd-ebf8-44f3-986c-8d04d554abb5", ResourceVersion:"1125", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.125.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"3e:9d:91:27:bc:36", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:58:46.513323 env[1214]: 2024-12-13 13:58:46.507 [INFO][2754] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.30-k8s-nfs--server--provisioner--0-eth0" Dec 13 13:58:46.518000 audit[2793]: NETFILTER_CFG table=filter:91 family=2 entries=38 op=nft_register_chain pid=2793 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:58:46.518000 audit[2793]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19820 a0=3 a1=ffffcb5f9680 a2=0 a3=ffffa518dfa8 items=0 ppid=2095 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:46.518000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:58:46.525451 env[1214]: time="2024-12-13T13:58:46.525373824Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:58:46.525451 env[1214]: time="2024-12-13T13:58:46.525427174Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:58:46.525636 env[1214]: time="2024-12-13T13:58:46.525438021Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:58:46.526488 env[1214]: time="2024-12-13T13:58:46.525863703Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0 pid=2801 runtime=io.containerd.runc.v2 Dec 13 13:58:46.540356 systemd[1]: Started cri-containerd-96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0.scope. Dec 13 13:58:46.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.557000 audit: BPF prog-id=112 op=LOAD Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2801 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:46.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623837373334396535323466363837343936356266643336333530 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2801 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:46.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623837373334396535323466363837343936356266643336333530 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit: BPF prog-id=113 op=LOAD Dec 13 13:58:46.558000 audit[2810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2801 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:46.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623837373334396535323466363837343936356266643336333530 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit: BPF prog-id=114 op=LOAD Dec 13 13:58:46.558000 audit[2810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2801 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:46.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623837373334396535323466363837343936356266643336333530 Dec 13 13:58:46.558000 audit: BPF prog-id=114 op=UNLOAD Dec 13 13:58:46.558000 audit: BPF prog-id=113 op=UNLOAD Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { perfmon } for pid=2810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit[2810]: AVC avc: denied { bpf } for pid=2810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:46.558000 audit: BPF prog-id=115 op=LOAD Dec 13 13:58:46.558000 audit[2810]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2801 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:46.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623837373334396535323466363837343936356266643336333530 Dec 13 13:58:46.559774 systemd-resolved[1159]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 13:58:46.576136 env[1214]: time="2024-12-13T13:58:46.575565952Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:52e4cefd-ebf8-44f3-986c-8d04d554abb5,Namespace:default,Attempt:0,} returns sandbox id \"96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0\"" Dec 13 13:58:46.577315 env[1214]: time="2024-12-13T13:58:46.577287532Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 13:58:47.077072 kubelet[1464]: E1213 13:58:47.077036 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:47.804063 systemd-networkd[1045]: cali60e51b789ff: Gained IPv6LL Dec 13 13:58:47.972618 update_engine[1206]: I1213 13:58:47.972563 1206 update_attempter.cc:509] Updating boot flags... Dec 13 13:58:48.077836 kubelet[1464]: E1213 13:58:48.077721 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:48.180882 kubelet[1464]: E1213 13:58:48.180853 1464 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:58:48.793928 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3088467380.mount: Deactivated successfully. Dec 13 13:58:49.078988 kubelet[1464]: E1213 13:58:49.078879 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:50.079959 kubelet[1464]: E1213 13:58:50.079910 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:50.563379 env[1214]: time="2024-12-13T13:58:50.563334921Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:50.564864 env[1214]: time="2024-12-13T13:58:50.564835780Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:50.566554 env[1214]: time="2024-12-13T13:58:50.566523286Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:50.568216 env[1214]: time="2024-12-13T13:58:50.568186982Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:58:50.569028 env[1214]: time="2024-12-13T13:58:50.568987315Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Dec 13 13:58:50.571757 env[1214]: time="2024-12-13T13:58:50.571707462Z" level=info msg="CreateContainer within sandbox \"96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 13:58:50.580042 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3936022277.mount: Deactivated successfully. Dec 13 13:58:50.584734 env[1214]: time="2024-12-13T13:58:50.584697275Z" level=info msg="CreateContainer within sandbox \"96b877349e524f6874965bfd36350a8d176b6074480e023365f23886d2e39fa0\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"f905f466efd43a074510c21893bacd16bcbe76d30041fb8e1e8c0b880ba0f967\"" Dec 13 13:58:50.585236 env[1214]: time="2024-12-13T13:58:50.585212315Z" level=info msg="StartContainer for \"f905f466efd43a074510c21893bacd16bcbe76d30041fb8e1e8c0b880ba0f967\"" Dec 13 13:58:50.603454 systemd[1]: run-containerd-runc-k8s.io-f905f466efd43a074510c21893bacd16bcbe76d30041fb8e1e8c0b880ba0f967-runc.ArMJxt.mount: Deactivated successfully. Dec 13 13:58:50.606832 systemd[1]: Started cri-containerd-f905f466efd43a074510c21893bacd16bcbe76d30041fb8e1e8c0b880ba0f967.scope. Dec 13 13:58:50.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.649000 audit: BPF prog-id=116 op=LOAD Dec 13 13:58:50.649000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.649000 audit[2881]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2801 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:50.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639303566343636656664343361303734353130633231383933626163 Dec 13 13:58:50.650000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.650000 audit[2881]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2801 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:50.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639303566343636656664343361303734353130633231383933626163 Dec 13 13:58:50.651000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.651000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.651000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.651000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.651000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.651000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.651000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.651000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.651000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.651000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.651000 audit: BPF prog-id=117 op=LOAD Dec 13 13:58:50.651000 audit[2881]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2801 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:50.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639303566343636656664343361303734353130633231383933626163 Dec 13 13:58:50.652000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.652000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.652000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.652000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.652000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.652000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.652000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.652000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.652000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.652000 audit: BPF prog-id=118 op=LOAD Dec 13 13:58:50.652000 audit[2881]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2801 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:50.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639303566343636656664343361303734353130633231383933626163 Dec 13 13:58:50.654000 audit: BPF prog-id=118 op=UNLOAD Dec 13 13:58:50.654000 audit: BPF prog-id=117 op=UNLOAD Dec 13 13:58:50.654000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.654000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.654000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.654000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.654000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.654000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.654000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.654000 audit[2881]: AVC avc: denied { perfmon } for pid=2881 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.654000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.654000 audit[2881]: AVC avc: denied { bpf } for pid=2881 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:58:50.654000 audit: BPF prog-id=119 op=LOAD Dec 13 13:58:50.654000 audit[2881]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2801 pid=2881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:50.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639303566343636656664343361303734353130633231383933626163 Dec 13 13:58:50.687536 env[1214]: time="2024-12-13T13:58:50.687388487Z" level=info msg="StartContainer for \"f905f466efd43a074510c21893bacd16bcbe76d30041fb8e1e8c0b880ba0f967\" returns successfully" Dec 13 13:58:50.779000 audit[2908]: AVC avc: denied { search } for pid=2908 comm="rpcbind" name="crypto" dev="proc" ino=17786 scontext=system_u:system_r:svirt_lxc_net_t:s0:c278,c474 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 13:58:50.779000 audit[2908]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffbcdff000 a2=0 a3=0 items=0 ppid=2890 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c278,c474 key=(null) Dec 13 13:58:50.779000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 13:58:50.817000 audit[2913]: AVC avc: denied { search } for pid=2913 comm="dbus-daemon" name="crypto" dev="proc" ino=17786 scontext=system_u:system_r:svirt_lxc_net_t:s0:c278,c474 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 13:58:50.817000 audit[2913]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8610f000 a2=0 a3=0 items=0 ppid=2890 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c278,c474 key=(null) Dec 13 13:58:50.817000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 13:58:50.828000 audit[2914]: AVC avc: denied { watch } for pid=2914 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537196 scontext=system_u:system_r:svirt_lxc_net_t:s0:c278,c474 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c278,c474 tclass=dir permissive=0 Dec 13 13:58:50.828000 audit[2914]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaadda56a40 a2=2c8 a3=aaaadda3ba60 items=0 ppid=2890 pid=2914 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c278,c474 key=(null) Dec 13 13:58:50.828000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 13:58:50.832000 audit[2915]: AVC avc: denied { read } for pid=2915 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=18901 scontext=system_u:system_r:svirt_lxc_net_t:s0:c278,c474 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 13:58:50.832000 audit[2915]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffbd51a570 a2=80000 a3=0 items=0 ppid=2890 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c278,c474 key=(null) Dec 13 13:58:50.832000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 13:58:50.833000 audit[2915]: AVC avc: denied { search } for pid=2915 comm="ganesha.nfsd" name="crypto" dev="proc" ino=17786 scontext=system_u:system_r:svirt_lxc_net_t:s0:c278,c474 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 13:58:50.833000 audit[2915]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffbc8af000 a2=0 a3=0 items=0 ppid=2890 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c278,c474 key=(null) Dec 13 13:58:50.833000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 13:58:51.052334 kubelet[1464]: E1213 13:58:51.052282 1464 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:51.080601 kubelet[1464]: E1213 13:58:51.080501 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:51.332761 kubelet[1464]: I1213 13:58:51.332659 1464 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.3401925270000001 podStartE2EDuration="5.33262369s" podCreationTimestamp="2024-12-13 13:58:46 +0000 UTC" firstStartedPulling="2024-12-13 13:58:46.576901633 +0000 UTC m=+36.208844131" lastFinishedPulling="2024-12-13 13:58:50.569332756 +0000 UTC m=+40.201275294" observedRunningTime="2024-12-13 13:58:51.331491467 +0000 UTC m=+40.963433965" watchObservedRunningTime="2024-12-13 13:58:51.33262369 +0000 UTC m=+40.964566188" Dec 13 13:58:51.341000 audit[2933]: NETFILTER_CFG table=filter:92 family=2 entries=20 op=nft_register_rule pid=2933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:51.343752 kernel: kauditd_printk_skb: 134 callbacks suppressed Dec 13 13:58:51.343806 kernel: audit: type=1325 audit(1734098331.341:767): table=filter:92 family=2 entries=20 op=nft_register_rule pid=2933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:51.341000 audit[2933]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe928ce40 a2=0 a3=1 items=0 ppid=1686 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:51.348016 kernel: audit: type=1300 audit(1734098331.341:767): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe928ce40 a2=0 a3=1 items=0 ppid=1686 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:51.348053 kernel: audit: type=1327 audit(1734098331.341:767): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:51.341000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:51.350000 audit[2933]: NETFILTER_CFG table=nat:93 family=2 entries=106 op=nft_register_chain pid=2933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:51.350000 audit[2933]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffe928ce40 a2=0 a3=1 items=0 ppid=1686 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:51.356697 kernel: audit: type=1325 audit(1734098331.350:768): table=nat:93 family=2 entries=106 op=nft_register_chain pid=2933 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:58:51.356756 kernel: audit: type=1300 audit(1734098331.350:768): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffe928ce40 a2=0 a3=1 items=0 ppid=1686 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:58:51.356822 kernel: audit: type=1327 audit(1734098331.350:768): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:51.350000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:58:52.081799 kubelet[1464]: E1213 13:58:52.081368 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:53.082033 kubelet[1464]: E1213 13:58:53.081987 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:54.082538 kubelet[1464]: E1213 13:58:54.082474 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:55.082859 kubelet[1464]: E1213 13:58:55.082818 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:56.083888 kubelet[1464]: E1213 13:58:56.083829 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:57.084653 kubelet[1464]: E1213 13:58:57.084607 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:58.085340 kubelet[1464]: E1213 13:58:58.085297 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:58:59.085936 kubelet[1464]: E1213 13:58:59.085884 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:59:00.086878 kubelet[1464]: E1213 13:59:00.086837 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:59:00.386758 kubelet[1464]: I1213 13:59:00.386501 1464 topology_manager.go:215] "Topology Admit Handler" podUID="e9f1f1bf-b20a-4386-be78-3ff94865081f" podNamespace="default" podName="test-pod-1" Dec 13 13:59:00.391181 systemd[1]: Created slice kubepods-besteffort-pode9f1f1bf_b20a_4386_be78_3ff94865081f.slice. Dec 13 13:59:00.547308 kubelet[1464]: I1213 13:59:00.547277 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9prw4\" (UniqueName: \"kubernetes.io/projected/e9f1f1bf-b20a-4386-be78-3ff94865081f-kube-api-access-9prw4\") pod \"test-pod-1\" (UID: \"e9f1f1bf-b20a-4386-be78-3ff94865081f\") " pod="default/test-pod-1" Dec 13 13:59:00.547553 kubelet[1464]: I1213 13:59:00.547511 1464 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-612cee14-52e1-4b13-8c63-17b05961caae\" (UniqueName: \"kubernetes.io/nfs/e9f1f1bf-b20a-4386-be78-3ff94865081f-pvc-612cee14-52e1-4b13-8c63-17b05961caae\") pod \"test-pod-1\" (UID: \"e9f1f1bf-b20a-4386-be78-3ff94865081f\") " pod="default/test-pod-1" Dec 13 13:59:00.667000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.671169 kernel: Failed to create system directory netfs Dec 13 13:59:00.671242 kernel: audit: type=1400 audit(1734098340.667:769): avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.671266 kernel: Failed to create system directory netfs Dec 13 13:59:00.671281 kernel: audit: type=1400 audit(1734098340.667:769): avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.667000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.673904 kernel: Failed to create system directory netfs Dec 13 13:59:00.673973 kernel: audit: type=1400 audit(1734098340.667:769): avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.667000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.676332 kernel: Failed to create system directory netfs Dec 13 13:59:00.676400 kernel: audit: type=1400 audit(1734098340.667:769): avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.667000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.680273 kernel: audit: type=1300 audit(1734098340.667:769): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad1e095e0 a1=12c14 a2=aaaabaabe028 a3=aaaad1dfa010 items=0 ppid=63 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:00.667000 audit[2944]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad1e095e0 a1=12c14 a2=aaaabaabe028 a3=aaaad1dfa010 items=0 ppid=63 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:00.682459 kernel: audit: type=1327 audit(1734098340.667:769): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 13:59:00.667000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 13:59:00.681000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.686917 kernel: Failed to create system directory fscache Dec 13 13:59:00.686981 kernel: audit: type=1400 audit(1734098340.681:770): avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.687009 kernel: Failed to create system directory fscache Dec 13 13:59:00.687026 kernel: audit: type=1400 audit(1734098340.681:770): avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.681000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.689260 kernel: Failed to create system directory fscache Dec 13 13:59:00.689295 kernel: audit: type=1400 audit(1734098340.681:770): avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.681000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.691663 kernel: Failed to create system directory fscache Dec 13 13:59:00.691718 kernel: audit: type=1400 audit(1734098340.681:770): avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.681000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.681000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.681000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.681000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.695118 kernel: Failed to create system directory fscache Dec 13 13:59:00.695143 kernel: Failed to create system directory fscache Dec 13 13:59:00.695168 kernel: Failed to create system directory fscache Dec 13 13:59:00.695186 kernel: Failed to create system directory fscache Dec 13 13:59:00.681000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.681000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.695948 kernel: Failed to create system directory fscache Dec 13 13:59:00.695977 kernel: Failed to create system directory fscache Dec 13 13:59:00.681000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.681000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.696817 kernel: Failed to create system directory fscache Dec 13 13:59:00.681000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.681000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.681000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.698084 kernel: Failed to create system directory fscache Dec 13 13:59:00.698106 kernel: Failed to create system directory fscache Dec 13 13:59:00.698122 kernel: Failed to create system directory fscache Dec 13 13:59:00.698754 kernel: FS-Cache: Loaded Dec 13 13:59:00.681000 audit[2944]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad201c210 a1=4c344 a2=aaaabaabe028 a3=aaaad1dfa010 items=0 ppid=63 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:00.681000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.720142 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.720182 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.720199 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.720963 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.720999 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.721809 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.721847 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.723016 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.723044 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.723060 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.723855 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.723881 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.725048 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.725065 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.725083 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.725836 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.725852 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.727028 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.727048 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.727063 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.727830 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.727846 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.729022 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.729040 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.729057 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.729814 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.729837 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.731004 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.731035 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.731050 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.731796 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.731843 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.733014 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.733047 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.733061 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.733831 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.733854 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.735071 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.735093 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.735109 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.735901 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.735923 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.737139 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.737161 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.737178 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.737948 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.737967 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.738751 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.738767 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.739949 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.739965 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.739978 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.740735 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.740764 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.741928 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.741953 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.741968 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.743132 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.743152 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.743171 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.743943 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.743964 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.744740 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.744760 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.745950 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.745970 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.745990 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.746778 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.746803 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.748008 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.748030 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.748049 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.748823 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.748845 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.750056 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.750085 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.750103 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.750882 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.750911 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.752117 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.752137 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.752151 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.752957 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.752985 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.753764 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.753788 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.754990 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.755008 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.755021 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.755811 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.755839 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.757045 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.757069 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.757086 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.757868 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.757885 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.759100 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.759117 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.759134 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.759923 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.759952 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.760809 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.760838 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.762070 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.762097 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.762113 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.762923 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.762939 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.763781 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.763804 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.765041 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.765062 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.765075 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.765887 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.765911 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.767148 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.767163 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.767176 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.767983 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.768005 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.768834 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.768850 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.770115 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.770139 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.770161 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.713000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.770980 kernel: Failed to create system directory sunrpc Dec 13 13:59:00.781845 kernel: RPC: Registered named UNIX socket transport module. Dec 13 13:59:00.781932 kernel: RPC: Registered udp transport module. Dec 13 13:59:00.781970 kernel: RPC: Registered tcp transport module. Dec 13 13:59:00.781985 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 13:59:00.713000 audit[2944]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad2068560 a1=14a504 a2=aaaabaabe028 a3=aaaad1dfa010 items=6 ppid=63 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:00.713000 audit: CWD cwd="/" Dec 13 13:59:00.713000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:59:00.713000 audit: PATH item=1 name=(null) inode=17207 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:59:00.713000 audit: PATH item=2 name=(null) inode=17207 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:59:00.713000 audit: PATH item=3 name=(null) inode=17208 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:59:00.713000 audit: PATH item=4 name=(null) inode=17207 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:59:00.713000 audit: PATH item=5 name=(null) inode=17209 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:59:00.713000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.808099 kernel: Failed to create system directory nfs Dec 13 13:59:00.808135 kernel: Failed to create system directory nfs Dec 13 13:59:00.808152 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.808900 kernel: Failed to create system directory nfs Dec 13 13:59:00.808925 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.810133 kernel: Failed to create system directory nfs Dec 13 13:59:00.810160 kernel: Failed to create system directory nfs Dec 13 13:59:00.810174 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.810962 kernel: Failed to create system directory nfs Dec 13 13:59:00.810994 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.811800 kernel: Failed to create system directory nfs Dec 13 13:59:00.811821 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.813018 kernel: Failed to create system directory nfs Dec 13 13:59:00.813034 kernel: Failed to create system directory nfs Dec 13 13:59:00.813060 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.813811 kernel: Failed to create system directory nfs Dec 13 13:59:00.813834 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.814991 kernel: Failed to create system directory nfs Dec 13 13:59:00.815012 kernel: Failed to create system directory nfs Dec 13 13:59:00.815026 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.815786 kernel: Failed to create system directory nfs Dec 13 13:59:00.815810 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.816957 kernel: Failed to create system directory nfs Dec 13 13:59:00.816973 kernel: Failed to create system directory nfs Dec 13 13:59:00.816986 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.817732 kernel: Failed to create system directory nfs Dec 13 13:59:00.817749 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.818886 kernel: Failed to create system directory nfs Dec 13 13:59:00.818907 kernel: Failed to create system directory nfs Dec 13 13:59:00.818924 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.820060 kernel: Failed to create system directory nfs Dec 13 13:59:00.820077 kernel: Failed to create system directory nfs Dec 13 13:59:00.820090 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.820884 kernel: Failed to create system directory nfs Dec 13 13:59:00.820905 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.822078 kernel: Failed to create system directory nfs Dec 13 13:59:00.822113 kernel: Failed to create system directory nfs Dec 13 13:59:00.822128 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.822852 kernel: Failed to create system directory nfs Dec 13 13:59:00.822883 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.824012 kernel: Failed to create system directory nfs Dec 13 13:59:00.824039 kernel: Failed to create system directory nfs Dec 13 13:59:00.824057 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.824782 kernel: Failed to create system directory nfs Dec 13 13:59:00.824799 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.825944 kernel: Failed to create system directory nfs Dec 13 13:59:00.825960 kernel: Failed to create system directory nfs Dec 13 13:59:00.825973 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.827119 kernel: Failed to create system directory nfs Dec 13 13:59:00.827141 kernel: Failed to create system directory nfs Dec 13 13:59:00.827155 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.827901 kernel: Failed to create system directory nfs Dec 13 13:59:00.827928 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.829082 kernel: Failed to create system directory nfs Dec 13 13:59:00.829098 kernel: Failed to create system directory nfs Dec 13 13:59:00.829116 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.829859 kernel: Failed to create system directory nfs Dec 13 13:59:00.829880 kernel: Failed to create system directory nfs Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.802000 audit[2944]: AVC avc: denied { confidentiality } for pid=2944 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.831025 kernel: Failed to create system directory nfs Dec 13 13:59:00.831041 kernel: Failed to create system directory nfs Dec 13 13:59:00.853753 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 13:59:00.802000 audit[2944]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad22116f0 a1=116204 a2=aaaabaabe028 a3=aaaad1dfa010 items=0 ppid=63 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:00.802000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.886078 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.886120 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.886134 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.886147 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.886991 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.887875 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.887894 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.888856 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.888872 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.889777 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.889801 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.890739 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.890757 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.890776 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.892025 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.892045 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.892066 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.892876 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.892897 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.893786 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.893834 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.895061 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.895090 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.895106 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.895877 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.895916 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.897130 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.897184 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.897212 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.897995 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.898043 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.898846 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.898884 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.900098 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.900174 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.900190 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.900975 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.901014 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.901859 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.901909 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.902779 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.904079 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.904105 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.904119 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.904132 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.904929 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.905784 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.905848 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.905863 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.907034 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.907067 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.907083 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.907881 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.907937 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.908733 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.908762 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.910005 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.910037 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.910055 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.910878 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.910900 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.912151 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.912185 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.912202 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.912988 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.913020 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.913831 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.913854 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.915118 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.915163 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.915177 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.915978 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.916010 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.916814 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.916861 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.918057 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.918095 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.918113 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.918896 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.918939 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.919746 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.919782 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.921013 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.921070 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.921087 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.921963 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.922001 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.924139 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.924249 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.924271 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.926139 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.926195 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.928950 kernel: Failed to create system directory nfs4 Dec 13 13:59:00.875000 audit[2949]: AVC avc: denied { confidentiality } for pid=2949 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:00.929835 kernel: Failed to create system directory nfs4 Dec 13 13:59:01.029769 kernel: NFS: Registering the id_resolver key type Dec 13 13:59:01.030218 kernel: Key type id_resolver registered Dec 13 13:59:01.030243 kernel: Key type id_legacy registered Dec 13 13:59:00.875000 audit[2949]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff9239a010 a1=19c49c a2=aaaae713e028 a3=aaab24563010 items=0 ppid=63 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:00.875000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.041148 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.041199 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.041217 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.041232 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.042098 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.042124 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.043121 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.044054 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.044078 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.044096 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.044964 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.044987 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.045864 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.045884 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.046762 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.046784 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.048074 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.048124 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.048146 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.048981 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.049020 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.049871 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.050006 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.050833 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.050922 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.037000 audit[2951]: AVC avc: denied { confidentiality } for pid=2951 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:59:01.051752 kernel: Failed to create system directory rpcgss Dec 13 13:59:01.037000 audit[2951]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffaaf82010 a1=5ee04 a2=aaaaba50e028 a3=aaaad7722010 items=0 ppid=63 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:01.037000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 13:59:01.084650 nfsidmap[2958]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 13:59:01.087162 kubelet[1464]: E1213 13:59:01.087121 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:59:01.091151 nfsidmap[2961]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 13:59:01.101000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2504 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 13:59:01.101000 audit[1286]: AVC avc: denied { watch_reads } for pid=1286 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2504 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 13:59:01.101000 audit[1286]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaac4766cf0 a2=10 a3=0 items=0 ppid=1 pid=1286 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:01.101000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2504 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 13:59:01.101000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 13:59:01.101000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2504 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 13:59:01.101000 audit[1286]: AVC avc: denied { watch_reads } for pid=1286 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2504 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 13:59:01.101000 audit[1286]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaac4766cf0 a2=10 a3=0 items=0 ppid=1 pid=1286 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:01.101000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 13:59:01.101000 audit[1286]: AVC avc: denied { watch_reads } for pid=1286 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2504 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 13:59:01.101000 audit[1286]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaac4766cf0 a2=10 a3=0 items=0 ppid=1 pid=1286 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:01.101000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 13:59:01.293521 env[1214]: time="2024-12-13T13:59:01.293459296Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e9f1f1bf-b20a-4386-be78-3ff94865081f,Namespace:default,Attempt:0,}" Dec 13 13:59:01.426252 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 13:59:01.426369 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 13:59:01.426389 systemd-networkd[1045]: cali5ec59c6bf6e: Link UP Dec 13 13:59:01.426549 systemd-networkd[1045]: cali5ec59c6bf6e: Gained carrier Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.352 [INFO][2968] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.30-k8s-test--pod--1-eth0 default e9f1f1bf-b20a-4386-be78-3ff94865081f 1196 0 2024-12-13 13:58:46 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.30 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.30-k8s-test--pod--1-" Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.352 [INFO][2968] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.30-k8s-test--pod--1-eth0" Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.379 [INFO][2979] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9" HandleID="k8s-pod-network.ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9" Workload="10.0.0.30-k8s-test--pod--1-eth0" Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.392 [INFO][2979] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9" HandleID="k8s-pod-network.ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9" Workload="10.0.0.30-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400027b590), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.30", "pod":"test-pod-1", "timestamp":"2024-12-13 13:59:01.379530909 +0000 UTC"}, Hostname:"10.0.0.30", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.392 [INFO][2979] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.392 [INFO][2979] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.392 [INFO][2979] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.30' Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.394 [INFO][2979] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9" host="10.0.0.30" Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.400 [INFO][2979] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.30" Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.405 [INFO][2979] ipam/ipam.go 489: Trying affinity for 192.168.125.0/26 host="10.0.0.30" Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.407 [INFO][2979] ipam/ipam.go 155: Attempting to load block cidr=192.168.125.0/26 host="10.0.0.30" Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.409 [INFO][2979] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.0/26 host="10.0.0.30" Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.409 [INFO][2979] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.0/26 handle="k8s-pod-network.ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9" host="10.0.0.30" Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.411 [INFO][2979] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9 Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.416 [INFO][2979] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.125.0/26 handle="k8s-pod-network.ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9" host="10.0.0.30" Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.421 [INFO][2979] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.125.4/26] block=192.168.125.0/26 handle="k8s-pod-network.ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9" host="10.0.0.30" Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.421 [INFO][2979] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.4/26] handle="k8s-pod-network.ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9" host="10.0.0.30" Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.421 [INFO][2979] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.421 [INFO][2979] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.125.4/26] IPv6=[] ContainerID="ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9" HandleID="k8s-pod-network.ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9" Workload="10.0.0.30-k8s-test--pod--1-eth0" Dec 13 13:59:01.435702 env[1214]: 2024-12-13 13:59:01.423 [INFO][2968] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.30-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e9f1f1bf-b20a-4386-be78-3ff94865081f", ResourceVersion:"1196", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:59:01.436329 env[1214]: 2024-12-13 13:59:01.423 [INFO][2968] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.125.4/32] ContainerID="ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.30-k8s-test--pod--1-eth0" Dec 13 13:59:01.436329 env[1214]: 2024-12-13 13:59:01.423 [INFO][2968] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.30-k8s-test--pod--1-eth0" Dec 13 13:59:01.436329 env[1214]: 2024-12-13 13:59:01.426 [INFO][2968] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.30-k8s-test--pod--1-eth0" Dec 13 13:59:01.436329 env[1214]: 2024-12-13 13:59:01.426 [INFO][2968] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.30-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.30-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e9f1f1bf-b20a-4386-be78-3ff94865081f", ResourceVersion:"1196", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 58, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.30", ContainerID:"ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.125.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"0e:59:e2:ab:ab:d7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:59:01.436329 env[1214]: 2024-12-13 13:59:01.434 [INFO][2968] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.30-k8s-test--pod--1-eth0" Dec 13 13:59:01.443000 audit[3000]: NETFILTER_CFG table=filter:94 family=2 entries=38 op=nft_register_chain pid=3000 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:59:01.443000 audit[3000]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19400 a0=3 a1=ffffc0d572a0 a2=0 a3=ffff93303fa8 items=0 ppid=2095 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:01.443000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:59:01.448787 env[1214]: time="2024-12-13T13:59:01.448598147Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:59:01.448787 env[1214]: time="2024-12-13T13:59:01.448636078Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:59:01.448787 env[1214]: time="2024-12-13T13:59:01.448646321Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:59:01.449093 env[1214]: time="2024-12-13T13:59:01.449047877Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9 pid=3008 runtime=io.containerd.runc.v2 Dec 13 13:59:01.459700 systemd[1]: Started cri-containerd-ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9.scope. Dec 13 13:59:01.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.490000 audit: BPF prog-id=120 op=LOAD Dec 13 13:59:01.490000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.490000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3008 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:01.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164303831353732643066666439663561316339393831616632666361 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3008 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:01.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164303831353732643066666439663561316339393831616632666361 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit: BPF prog-id=121 op=LOAD Dec 13 13:59:01.491000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3008 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:01.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164303831353732643066666439663561316339393831616632666361 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit: BPF prog-id=122 op=LOAD Dec 13 13:59:01.491000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3008 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:01.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164303831353732643066666439663561316339393831616632666361 Dec 13 13:59:01.491000 audit: BPF prog-id=122 op=UNLOAD Dec 13 13:59:01.491000 audit: BPF prog-id=121 op=UNLOAD Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { perfmon } for pid=3018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit[3018]: AVC avc: denied { bpf } for pid=3018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:01.491000 audit: BPF prog-id=123 op=LOAD Dec 13 13:59:01.491000 audit[3018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3008 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:01.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164303831353732643066666439663561316339393831616632666361 Dec 13 13:59:01.493155 systemd-resolved[1159]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 13:59:01.508055 env[1214]: time="2024-12-13T13:59:01.508013168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e9f1f1bf-b20a-4386-be78-3ff94865081f,Namespace:default,Attempt:0,} returns sandbox id \"ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9\"" Dec 13 13:59:01.509934 env[1214]: time="2024-12-13T13:59:01.509904872Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 13:59:02.087674 kubelet[1464]: E1213 13:59:02.087626 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:59:02.300320 env[1214]: time="2024-12-13T13:59:02.300268125Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:59:02.301869 env[1214]: time="2024-12-13T13:59:02.301838561Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:59:02.303647 env[1214]: time="2024-12-13T13:59:02.303622095Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:59:02.304832 env[1214]: time="2024-12-13T13:59:02.304799141Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:59:02.305119 env[1214]: time="2024-12-13T13:59:02.305084420Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de\"" Dec 13 13:59:02.309119 env[1214]: time="2024-12-13T13:59:02.309068684Z" level=info msg="CreateContainer within sandbox \"ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 13:59:02.326783 env[1214]: time="2024-12-13T13:59:02.326744701Z" level=info msg="CreateContainer within sandbox \"ad081572d0ffd9f5a1c9981af2fcaf6a2c8249144732497045200ae5456573c9\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"a7797723fb8760b81cc1d36e6c8e7ba2c9d28c5ff8c7a8ddfc9611cccb885abc\"" Dec 13 13:59:02.327470 env[1214]: time="2024-12-13T13:59:02.327447055Z" level=info msg="StartContainer for \"a7797723fb8760b81cc1d36e6c8e7ba2c9d28c5ff8c7a8ddfc9611cccb885abc\"" Dec 13 13:59:02.341095 systemd[1]: Started cri-containerd-a7797723fb8760b81cc1d36e6c8e7ba2c9d28c5ff8c7a8ddfc9611cccb885abc.scope. Dec 13 13:59:02.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.398000 audit: BPF prog-id=124 op=LOAD Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3008 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:02.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373937373233666238373630623831636331643336653663386537 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3008 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:02.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373937373233666238373630623831636331643336653663386537 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit: BPF prog-id=125 op=LOAD Dec 13 13:59:02.399000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3008 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:02.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373937373233666238373630623831636331643336653663386537 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit: BPF prog-id=126 op=LOAD Dec 13 13:59:02.399000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3008 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:02.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373937373233666238373630623831636331643336653663386537 Dec 13 13:59:02.399000 audit: BPF prog-id=126 op=UNLOAD Dec 13 13:59:02.399000 audit: BPF prog-id=125 op=UNLOAD Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { perfmon } for pid=3049 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit[3049]: AVC avc: denied { bpf } for pid=3049 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:59:02.399000 audit: BPF prog-id=127 op=LOAD Dec 13 13:59:02.399000 audit[3049]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3008 pid=3049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:59:02.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373937373233666238373630623831636331643336653663386537 Dec 13 13:59:02.414440 env[1214]: time="2024-12-13T13:59:02.413476809Z" level=info msg="StartContainer for \"a7797723fb8760b81cc1d36e6c8e7ba2c9d28c5ff8c7a8ddfc9611cccb885abc\" returns successfully" Dec 13 13:59:02.651933 systemd-networkd[1045]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 13:59:03.088718 kubelet[1464]: E1213 13:59:03.088668 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:59:03.358100 kubelet[1464]: I1213 13:59:03.357995 1464 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=16.561621726 podStartE2EDuration="17.357951315s" podCreationTimestamp="2024-12-13 13:58:46 +0000 UTC" firstStartedPulling="2024-12-13 13:59:01.509598464 +0000 UTC m=+51.141540962" lastFinishedPulling="2024-12-13 13:59:02.305928053 +0000 UTC m=+51.937870551" observedRunningTime="2024-12-13 13:59:03.357610704 +0000 UTC m=+52.989553162" watchObservedRunningTime="2024-12-13 13:59:03.357951315 +0000 UTC m=+52.989893813" Dec 13 13:59:04.089002 kubelet[1464]: E1213 13:59:04.088968 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:59:05.090262 kubelet[1464]: E1213 13:59:05.090193 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:59:06.090721 kubelet[1464]: E1213 13:59:06.090666 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:59:07.091293 kubelet[1464]: E1213 13:59:07.091235 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:59:08.092095 kubelet[1464]: E1213 13:59:08.092033 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:59:09.092911 kubelet[1464]: E1213 13:59:09.092865 1464 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"