Dec 13 13:56:15.727420 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Dec 13 13:56:15.727443 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Dec 13 12:58:58 -00 2024 Dec 13 13:56:15.727451 kernel: efi: EFI v2.70 by EDK II Dec 13 13:56:15.727457 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Dec 13 13:56:15.727462 kernel: random: crng init done Dec 13 13:56:15.727468 kernel: ACPI: Early table checksum verification disabled Dec 13 13:56:15.727474 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Dec 13 13:56:15.727481 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Dec 13 13:56:15.727487 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:56:15.727492 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:56:15.727498 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:56:15.727504 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:56:15.727509 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:56:15.727515 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:56:15.727523 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:56:15.727529 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:56:15.727535 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 13:56:15.727541 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Dec 13 13:56:15.727547 kernel: NUMA: Failed to initialise from firmware Dec 13 13:56:15.727553 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Dec 13 13:56:15.727558 kernel: NUMA: NODE_DATA [mem 0xdcb0a900-0xdcb0ffff] Dec 13 13:56:15.727564 kernel: Zone ranges: Dec 13 13:56:15.727570 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Dec 13 13:56:15.727577 kernel: DMA32 empty Dec 13 13:56:15.727582 kernel: Normal empty Dec 13 13:56:15.727588 kernel: Movable zone start for each node Dec 13 13:56:15.727594 kernel: Early memory node ranges Dec 13 13:56:15.727600 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Dec 13 13:56:15.727606 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Dec 13 13:56:15.727611 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Dec 13 13:56:15.727617 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Dec 13 13:56:15.727623 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Dec 13 13:56:15.727629 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Dec 13 13:56:15.727634 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Dec 13 13:56:15.727640 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Dec 13 13:56:15.727647 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Dec 13 13:56:15.727653 kernel: psci: probing for conduit method from ACPI. Dec 13 13:56:15.727659 kernel: psci: PSCIv1.1 detected in firmware. Dec 13 13:56:15.727665 kernel: psci: Using standard PSCI v0.2 function IDs Dec 13 13:56:15.727671 kernel: psci: Trusted OS migration not required Dec 13 13:56:15.727679 kernel: psci: SMC Calling Convention v1.1 Dec 13 13:56:15.727685 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Dec 13 13:56:15.727693 kernel: ACPI: SRAT not present Dec 13 13:56:15.727700 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Dec 13 13:56:15.727706 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Dec 13 13:56:15.727712 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Dec 13 13:56:15.727719 kernel: Detected PIPT I-cache on CPU0 Dec 13 13:56:15.727725 kernel: CPU features: detected: GIC system register CPU interface Dec 13 13:56:15.727731 kernel: CPU features: detected: Hardware dirty bit management Dec 13 13:56:15.727737 kernel: CPU features: detected: Spectre-v4 Dec 13 13:56:15.727743 kernel: CPU features: detected: Spectre-BHB Dec 13 13:56:15.727751 kernel: CPU features: kernel page table isolation forced ON by KASLR Dec 13 13:56:15.727757 kernel: CPU features: detected: Kernel page table isolation (KPTI) Dec 13 13:56:15.727763 kernel: CPU features: detected: ARM erratum 1418040 Dec 13 13:56:15.727769 kernel: CPU features: detected: SSBS not fully self-synchronizing Dec 13 13:56:15.727775 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Dec 13 13:56:15.727782 kernel: Policy zone: DMA Dec 13 13:56:15.727789 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 13:56:15.727796 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 13:56:15.727802 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 13:56:15.727808 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 13:56:15.727815 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 13:56:15.727823 kernel: Memory: 2457400K/2572288K available (9792K kernel code, 2092K rwdata, 7576K rodata, 36416K init, 777K bss, 114888K reserved, 0K cma-reserved) Dec 13 13:56:15.727834 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 13:56:15.727841 kernel: trace event string verifier disabled Dec 13 13:56:15.727847 kernel: rcu: Preemptible hierarchical RCU implementation. Dec 13 13:56:15.727854 kernel: rcu: RCU event tracing is enabled. Dec 13 13:56:15.727860 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 13:56:15.727866 kernel: Trampoline variant of Tasks RCU enabled. Dec 13 13:56:15.727873 kernel: Tracing variant of Tasks RCU enabled. Dec 13 13:56:15.727879 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 13:56:15.727885 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 13:56:15.727891 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Dec 13 13:56:15.727899 kernel: GICv3: 256 SPIs implemented Dec 13 13:56:15.727905 kernel: GICv3: 0 Extended SPIs implemented Dec 13 13:56:15.727911 kernel: GICv3: Distributor has no Range Selector support Dec 13 13:56:15.727917 kernel: Root IRQ handler: gic_handle_irq Dec 13 13:56:15.727923 kernel: GICv3: 16 PPIs implemented Dec 13 13:56:15.727930 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Dec 13 13:56:15.727936 kernel: ACPI: SRAT not present Dec 13 13:56:15.727942 kernel: ITS [mem 0x08080000-0x0809ffff] Dec 13 13:56:15.727948 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Dec 13 13:56:15.727954 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Dec 13 13:56:15.727961 kernel: GICv3: using LPI property table @0x00000000400d0000 Dec 13 13:56:15.727967 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Dec 13 13:56:15.727974 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 13:56:15.727981 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Dec 13 13:56:15.727987 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Dec 13 13:56:15.727993 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Dec 13 13:56:15.727999 kernel: arm-pv: using stolen time PV Dec 13 13:56:15.728006 kernel: Console: colour dummy device 80x25 Dec 13 13:56:15.728012 kernel: ACPI: Core revision 20210730 Dec 13 13:56:15.728019 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Dec 13 13:56:15.728026 kernel: pid_max: default: 32768 minimum: 301 Dec 13 13:56:15.728032 kernel: LSM: Security Framework initializing Dec 13 13:56:15.728039 kernel: SELinux: Initializing. Dec 13 13:56:15.728046 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 13:56:15.728052 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 13:56:15.728059 kernel: rcu: Hierarchical SRCU implementation. Dec 13 13:56:15.728065 kernel: Platform MSI: ITS@0x8080000 domain created Dec 13 13:56:15.728072 kernel: PCI/MSI: ITS@0x8080000 domain created Dec 13 13:56:15.728078 kernel: Remapping and enabling EFI services. Dec 13 13:56:15.728084 kernel: smp: Bringing up secondary CPUs ... Dec 13 13:56:15.728091 kernel: Detected PIPT I-cache on CPU1 Dec 13 13:56:15.728099 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Dec 13 13:56:15.728106 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Dec 13 13:56:15.728112 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 13:56:15.728118 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Dec 13 13:56:15.728125 kernel: Detected PIPT I-cache on CPU2 Dec 13 13:56:15.728131 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Dec 13 13:56:15.728138 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Dec 13 13:56:15.728144 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 13:56:15.728150 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Dec 13 13:56:15.728157 kernel: Detected PIPT I-cache on CPU3 Dec 13 13:56:15.728164 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Dec 13 13:56:15.728171 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Dec 13 13:56:15.728177 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 13:56:15.728183 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Dec 13 13:56:15.728194 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 13:56:15.728202 kernel: SMP: Total of 4 processors activated. Dec 13 13:56:15.728208 kernel: CPU features: detected: 32-bit EL0 Support Dec 13 13:56:15.728215 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Dec 13 13:56:15.728222 kernel: CPU features: detected: Common not Private translations Dec 13 13:56:15.728229 kernel: CPU features: detected: CRC32 instructions Dec 13 13:56:15.728243 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Dec 13 13:56:15.728250 kernel: CPU features: detected: LSE atomic instructions Dec 13 13:56:15.728258 kernel: CPU features: detected: Privileged Access Never Dec 13 13:56:15.728265 kernel: CPU features: detected: RAS Extension Support Dec 13 13:56:15.728272 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Dec 13 13:56:15.728278 kernel: CPU: All CPU(s) started at EL1 Dec 13 13:56:15.728285 kernel: alternatives: patching kernel code Dec 13 13:56:15.728293 kernel: devtmpfs: initialized Dec 13 13:56:15.728300 kernel: KASLR enabled Dec 13 13:56:15.728307 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 13:56:15.728314 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 13:56:15.728320 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 13:56:15.728327 kernel: SMBIOS 3.0.0 present. Dec 13 13:56:15.728334 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Dec 13 13:56:15.728341 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 13:56:15.728348 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Dec 13 13:56:15.728356 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 13 13:56:15.728363 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 13 13:56:15.728370 kernel: audit: initializing netlink subsys (disabled) Dec 13 13:56:15.728376 kernel: audit: type=2000 audit(0.031:1): state=initialized audit_enabled=0 res=1 Dec 13 13:56:15.728383 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 13:56:15.728390 kernel: cpuidle: using governor menu Dec 13 13:56:15.728396 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Dec 13 13:56:15.728403 kernel: ASID allocator initialised with 32768 entries Dec 13 13:56:15.728410 kernel: ACPI: bus type PCI registered Dec 13 13:56:15.728418 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 13:56:15.728425 kernel: Serial: AMBA PL011 UART driver Dec 13 13:56:15.728431 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 13:56:15.728438 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Dec 13 13:56:15.728445 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 13:56:15.728451 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Dec 13 13:56:15.728458 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 13:56:15.728465 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Dec 13 13:56:15.728472 kernel: ACPI: Added _OSI(Module Device) Dec 13 13:56:15.728479 kernel: ACPI: Added _OSI(Processor Device) Dec 13 13:56:15.728486 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 13:56:15.728493 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 13:56:15.728500 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 13:56:15.728506 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 13:56:15.728513 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 13:56:15.728520 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 13:56:15.728527 kernel: ACPI: Interpreter enabled Dec 13 13:56:15.728533 kernel: ACPI: Using GIC for interrupt routing Dec 13 13:56:15.728541 kernel: ACPI: MCFG table detected, 1 entries Dec 13 13:56:15.728548 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Dec 13 13:56:15.728554 kernel: printk: console [ttyAMA0] enabled Dec 13 13:56:15.728561 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 13:56:15.728681 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 13:56:15.728745 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Dec 13 13:56:15.728833 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Dec 13 13:56:15.728906 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Dec 13 13:56:15.729069 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Dec 13 13:56:15.729083 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Dec 13 13:56:15.729091 kernel: PCI host bridge to bus 0000:00 Dec 13 13:56:15.729163 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Dec 13 13:56:15.729218 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Dec 13 13:56:15.729301 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Dec 13 13:56:15.729358 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 13:56:15.729440 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Dec 13 13:56:15.729513 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 13:56:15.729577 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Dec 13 13:56:15.729639 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Dec 13 13:56:15.729725 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Dec 13 13:56:15.729790 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Dec 13 13:56:15.729869 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Dec 13 13:56:15.729933 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Dec 13 13:56:15.729988 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Dec 13 13:56:15.730043 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Dec 13 13:56:15.730113 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Dec 13 13:56:15.730124 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Dec 13 13:56:15.730132 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Dec 13 13:56:15.730139 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Dec 13 13:56:15.730148 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Dec 13 13:56:15.730155 kernel: iommu: Default domain type: Translated Dec 13 13:56:15.730162 kernel: iommu: DMA domain TLB invalidation policy: strict mode Dec 13 13:56:15.730169 kernel: vgaarb: loaded Dec 13 13:56:15.730176 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 13:56:15.730183 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 13:56:15.730189 kernel: PTP clock support registered Dec 13 13:56:15.730196 kernel: Registered efivars operations Dec 13 13:56:15.730203 kernel: clocksource: Switched to clocksource arch_sys_counter Dec 13 13:56:15.730211 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 13:56:15.730218 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 13:56:15.730225 kernel: pnp: PnP ACPI init Dec 13 13:56:15.730303 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Dec 13 13:56:15.730314 kernel: pnp: PnP ACPI: found 1 devices Dec 13 13:56:15.730321 kernel: NET: Registered PF_INET protocol family Dec 13 13:56:15.730328 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 13:56:15.730335 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 13:56:15.730344 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 13:56:15.730351 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 13:56:15.730358 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 13:56:15.730365 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 13:56:15.730372 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 13:56:15.730378 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 13:56:15.730385 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 13:56:15.730392 kernel: PCI: CLS 0 bytes, default 64 Dec 13 13:56:15.730399 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Dec 13 13:56:15.730407 kernel: kvm [1]: HYP mode not available Dec 13 13:56:15.730414 kernel: Initialise system trusted keyrings Dec 13 13:56:15.730420 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 13:56:15.730427 kernel: Key type asymmetric registered Dec 13 13:56:15.730434 kernel: Asymmetric key parser 'x509' registered Dec 13 13:56:15.730440 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 13:56:15.730447 kernel: io scheduler mq-deadline registered Dec 13 13:56:15.730454 kernel: io scheduler kyber registered Dec 13 13:56:15.730460 kernel: io scheduler bfq registered Dec 13 13:56:15.730468 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Dec 13 13:56:15.730475 kernel: ACPI: button: Power Button [PWRB] Dec 13 13:56:15.730482 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Dec 13 13:56:15.730543 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Dec 13 13:56:15.730553 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 13:56:15.730560 kernel: thunder_xcv, ver 1.0 Dec 13 13:56:15.730566 kernel: thunder_bgx, ver 1.0 Dec 13 13:56:15.730573 kernel: nicpf, ver 1.0 Dec 13 13:56:15.730579 kernel: nicvf, ver 1.0 Dec 13 13:56:15.730648 kernel: rtc-efi rtc-efi.0: registered as rtc0 Dec 13 13:56:15.730706 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-12-13T13:56:15 UTC (1734098175) Dec 13 13:56:15.730715 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 13:56:15.730722 kernel: NET: Registered PF_INET6 protocol family Dec 13 13:56:15.730729 kernel: Segment Routing with IPv6 Dec 13 13:56:15.730736 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 13:56:15.730743 kernel: NET: Registered PF_PACKET protocol family Dec 13 13:56:15.730750 kernel: Key type dns_resolver registered Dec 13 13:56:15.730758 kernel: registered taskstats version 1 Dec 13 13:56:15.730765 kernel: Loading compiled-in X.509 certificates Dec 13 13:56:15.730771 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e011ba9949ade5a6d03f7a5e28171f7f59e70f8a' Dec 13 13:56:15.730778 kernel: Key type .fscrypt registered Dec 13 13:56:15.730785 kernel: Key type fscrypt-provisioning registered Dec 13 13:56:15.730792 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 13:56:15.730798 kernel: ima: Allocated hash algorithm: sha1 Dec 13 13:56:15.730805 kernel: ima: No architecture policies found Dec 13 13:56:15.730812 kernel: clk: Disabling unused clocks Dec 13 13:56:15.730820 kernel: Freeing unused kernel memory: 36416K Dec 13 13:56:15.730832 kernel: Run /init as init process Dec 13 13:56:15.730841 kernel: with arguments: Dec 13 13:56:15.730847 kernel: /init Dec 13 13:56:15.730854 kernel: with environment: Dec 13 13:56:15.730860 kernel: HOME=/ Dec 13 13:56:15.730867 kernel: TERM=linux Dec 13 13:56:15.730873 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 13:56:15.730882 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 13:56:15.730892 systemd[1]: Detected virtualization kvm. Dec 13 13:56:15.730900 systemd[1]: Detected architecture arm64. Dec 13 13:56:15.730906 systemd[1]: Running in initrd. Dec 13 13:56:15.730913 systemd[1]: No hostname configured, using default hostname. Dec 13 13:56:15.730920 systemd[1]: Hostname set to . Dec 13 13:56:15.730928 systemd[1]: Initializing machine ID from VM UUID. Dec 13 13:56:15.730935 systemd[1]: Queued start job for default target initrd.target. Dec 13 13:56:15.730943 systemd[1]: Started systemd-ask-password-console.path. Dec 13 13:56:15.730951 systemd[1]: Reached target cryptsetup.target. Dec 13 13:56:15.730958 systemd[1]: Reached target paths.target. Dec 13 13:56:15.730965 systemd[1]: Reached target slices.target. Dec 13 13:56:15.730972 systemd[1]: Reached target swap.target. Dec 13 13:56:15.730979 systemd[1]: Reached target timers.target. Dec 13 13:56:15.730986 systemd[1]: Listening on iscsid.socket. Dec 13 13:56:15.730994 systemd[1]: Listening on iscsiuio.socket. Dec 13 13:56:15.731002 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 13:56:15.731009 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 13:56:15.731016 systemd[1]: Listening on systemd-journald.socket. Dec 13 13:56:15.731023 systemd[1]: Listening on systemd-networkd.socket. Dec 13 13:56:15.731031 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 13:56:15.731038 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 13:56:15.731045 systemd[1]: Reached target sockets.target. Dec 13 13:56:15.731052 systemd[1]: Starting kmod-static-nodes.service... Dec 13 13:56:15.731060 systemd[1]: Finished network-cleanup.service. Dec 13 13:56:15.731067 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 13:56:15.731075 systemd[1]: Starting systemd-journald.service... Dec 13 13:56:15.731082 systemd[1]: Starting systemd-modules-load.service... Dec 13 13:56:15.731089 systemd[1]: Starting systemd-resolved.service... Dec 13 13:56:15.731096 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 13:56:15.731103 systemd[1]: Finished kmod-static-nodes.service. Dec 13 13:56:15.731110 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 13:56:15.731117 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 13:56:15.731126 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 13:56:15.731133 kernel: audit: type=1130 audit(1734098175.726:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:15.731141 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 13:56:15.731151 systemd-journald[290]: Journal started Dec 13 13:56:15.731193 systemd-journald[290]: Runtime Journal (/run/log/journal/9587e49f8565403398c36de36bbc2b00) is 6.0M, max 48.7M, 42.6M free. Dec 13 13:56:15.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:15.722938 systemd-modules-load[291]: Inserted module 'overlay' Dec 13 13:56:15.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:15.735004 systemd[1]: Started systemd-journald.service. Dec 13 13:56:15.735032 kernel: audit: type=1130 audit(1734098175.732:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:15.735541 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 13:56:15.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:15.745494 kernel: audit: type=1130 audit(1734098175.735:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:15.747263 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 13:56:15.747907 systemd-resolved[292]: Positive Trust Anchors: Dec 13 13:56:15.747923 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 13:56:15.747952 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 13:56:15.754390 systemd-modules-load[291]: Inserted module 'br_netfilter' Dec 13 13:56:15.755250 kernel: Bridge firewalling registered Dec 13 13:56:15.755950 systemd-resolved[292]: Defaulting to hostname 'linux'. Dec 13 13:56:15.756948 systemd[1]: Started systemd-resolved.service. Dec 13 13:56:15.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:15.760741 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 13:56:15.763690 kernel: audit: type=1130 audit(1734098175.758:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:15.763709 kernel: audit: type=1130 audit(1734098175.761:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:15.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:15.763204 systemd[1]: Reached target nss-lookup.target. Dec 13 13:56:15.765028 systemd[1]: Starting dracut-cmdline.service... Dec 13 13:56:15.770414 kernel: SCSI subsystem initialized Dec 13 13:56:15.775123 dracut-cmdline[308]: dracut-dracut-053 Dec 13 13:56:15.777854 dracut-cmdline[308]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 13:56:15.782066 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 13:56:15.782083 kernel: device-mapper: uevent: version 1.0.3 Dec 13 13:56:15.782092 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 13:56:15.784486 systemd-modules-load[291]: Inserted module 'dm_multipath' Dec 13 13:56:15.785322 systemd[1]: Finished systemd-modules-load.service. Dec 13 13:56:15.786781 systemd[1]: Starting systemd-sysctl.service... Dec 13 13:56:15.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:15.790284 kernel: audit: type=1130 audit(1734098175.785:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:15.795455 systemd[1]: Finished systemd-sysctl.service. Dec 13 13:56:15.798273 kernel: audit: type=1130 audit(1734098175.795:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:15.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:15.847266 kernel: Loading iSCSI transport class v2.0-870. Dec 13 13:56:15.859270 kernel: iscsi: registered transport (tcp) Dec 13 13:56:15.878318 kernel: iscsi: registered transport (qla4xxx) Dec 13 13:56:15.878335 kernel: QLogic iSCSI HBA Driver Dec 13 13:56:15.910966 systemd[1]: Finished dracut-cmdline.service. Dec 13 13:56:15.912449 systemd[1]: Starting dracut-pre-udev.service... Dec 13 13:56:15.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:15.915267 kernel: audit: type=1130 audit(1734098175.911:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:15.956261 kernel: raid6: neonx8 gen() 13760 MB/s Dec 13 13:56:15.973250 kernel: raid6: neonx8 xor() 10847 MB/s Dec 13 13:56:15.990265 kernel: raid6: neonx4 gen() 13541 MB/s Dec 13 13:56:16.008192 kernel: raid6: neonx4 xor() 11167 MB/s Dec 13 13:56:16.024258 kernel: raid6: neonx2 gen() 12959 MB/s Dec 13 13:56:16.041262 kernel: raid6: neonx2 xor() 10324 MB/s Dec 13 13:56:16.058254 kernel: raid6: neonx1 gen() 10548 MB/s Dec 13 13:56:16.075258 kernel: raid6: neonx1 xor() 8799 MB/s Dec 13 13:56:16.092248 kernel: raid6: int64x8 gen() 6278 MB/s Dec 13 13:56:16.109257 kernel: raid6: int64x8 xor() 3544 MB/s Dec 13 13:56:16.126266 kernel: raid6: int64x4 gen() 7246 MB/s Dec 13 13:56:16.143260 kernel: raid6: int64x4 xor() 3856 MB/s Dec 13 13:56:16.160264 kernel: raid6: int64x2 gen() 6155 MB/s Dec 13 13:56:16.177251 kernel: raid6: int64x2 xor() 3322 MB/s Dec 13 13:56:16.194250 kernel: raid6: int64x1 gen() 5046 MB/s Dec 13 13:56:16.211455 kernel: raid6: int64x1 xor() 2646 MB/s Dec 13 13:56:16.211475 kernel: raid6: using algorithm neonx8 gen() 13760 MB/s Dec 13 13:56:16.211493 kernel: raid6: .... xor() 10847 MB/s, rmw enabled Dec 13 13:56:16.211509 kernel: raid6: using neon recovery algorithm Dec 13 13:56:16.222559 kernel: xor: measuring software checksum speed Dec 13 13:56:16.222582 kernel: 8regs : 17209 MB/sec Dec 13 13:56:16.222591 kernel: 32regs : 20723 MB/sec Dec 13 13:56:16.223485 kernel: arm64_neon : 27635 MB/sec Dec 13 13:56:16.223501 kernel: xor: using function: arm64_neon (27635 MB/sec) Dec 13 13:56:16.280259 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Dec 13 13:56:16.290254 systemd[1]: Finished dracut-pre-udev.service. Dec 13 13:56:16.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:16.291000 audit: BPF prog-id=7 op=LOAD Dec 13 13:56:16.292000 audit: BPF prog-id=8 op=LOAD Dec 13 13:56:16.293256 kernel: audit: type=1130 audit(1734098176.290:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:16.293439 systemd[1]: Starting systemd-udevd.service... Dec 13 13:56:16.305470 systemd-udevd[489]: Using default interface naming scheme 'v252'. Dec 13 13:56:16.308696 systemd[1]: Started systemd-udevd.service. Dec 13 13:56:16.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:16.310560 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 13:56:16.322145 dracut-pre-trigger[495]: rd.md=0: removing MD RAID activation Dec 13 13:56:16.348711 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 13:56:16.350097 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 13:56:16.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:16.405876 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 13:56:16.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:16.432263 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 13:56:16.437754 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 13:56:16.437770 kernel: GPT:9289727 != 19775487 Dec 13 13:56:16.437778 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 13:56:16.437787 kernel: GPT:9289727 != 19775487 Dec 13 13:56:16.437796 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 13:56:16.437804 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 13:56:16.454269 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (543) Dec 13 13:56:16.458135 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 13:56:16.458939 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 13:56:16.462647 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 13:56:16.465849 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 13:56:16.468990 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 13:56:16.470412 systemd[1]: Starting disk-uuid.service... Dec 13 13:56:16.476054 disk-uuid[561]: Primary Header is updated. Dec 13 13:56:16.476054 disk-uuid[561]: Secondary Entries is updated. Dec 13 13:56:16.476054 disk-uuid[561]: Secondary Header is updated. Dec 13 13:56:16.478631 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 13:56:17.490899 disk-uuid[562]: The operation has completed successfully. Dec 13 13:56:17.492143 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 13:56:17.508844 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 13:56:17.508940 systemd[1]: Finished disk-uuid.service. Dec 13 13:56:17.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:17.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:17.516598 systemd[1]: Starting verity-setup.service... Dec 13 13:56:17.537251 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Dec 13 13:56:17.556174 systemd[1]: Found device dev-mapper-usr.device. Dec 13 13:56:17.558218 systemd[1]: Mounting sysusr-usr.mount... Dec 13 13:56:17.559852 systemd[1]: Finished verity-setup.service. Dec 13 13:56:17.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:17.606266 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 13:56:17.606689 systemd[1]: Mounted sysusr-usr.mount. Dec 13 13:56:17.607332 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 13:56:17.608030 systemd[1]: Starting ignition-setup.service... Dec 13 13:56:17.609677 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 13:56:17.616649 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 13:56:17.616685 kernel: BTRFS info (device vda6): using free space tree Dec 13 13:56:17.616699 kernel: BTRFS info (device vda6): has skinny extents Dec 13 13:56:17.625949 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 13:56:17.632420 systemd[1]: Finished ignition-setup.service. Dec 13 13:56:17.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:17.633869 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 13:56:17.690880 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 13:56:17.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:17.691000 audit: BPF prog-id=9 op=LOAD Dec 13 13:56:17.692771 systemd[1]: Starting systemd-networkd.service... Dec 13 13:56:17.713629 ignition[648]: Ignition 2.14.0 Dec 13 13:56:17.713639 ignition[648]: Stage: fetch-offline Dec 13 13:56:17.713676 ignition[648]: no configs at "/usr/lib/ignition/base.d" Dec 13 13:56:17.713684 ignition[648]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 13:56:17.713808 ignition[648]: parsed url from cmdline: "" Dec 13 13:56:17.713811 ignition[648]: no config URL provided Dec 13 13:56:17.713816 ignition[648]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 13:56:17.713832 ignition[648]: no config at "/usr/lib/ignition/user.ign" Dec 13 13:56:17.713849 ignition[648]: op(1): [started] loading QEMU firmware config module Dec 13 13:56:17.713854 ignition[648]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 13:56:17.719967 systemd-networkd[735]: lo: Link UP Dec 13 13:56:17.719976 systemd-networkd[735]: lo: Gained carrier Dec 13 13:56:17.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:17.720652 ignition[648]: op(1): [finished] loading QEMU firmware config module Dec 13 13:56:17.720373 systemd-networkd[735]: Enumeration completed Dec 13 13:56:17.720542 systemd-networkd[735]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 13:56:17.720653 systemd[1]: Started systemd-networkd.service. Dec 13 13:56:17.721555 systemd-networkd[735]: eth0: Link UP Dec 13 13:56:17.721559 systemd-networkd[735]: eth0: Gained carrier Dec 13 13:56:17.721629 systemd[1]: Reached target network.target. Dec 13 13:56:17.723548 systemd[1]: Starting iscsiuio.service... Dec 13 13:56:17.731770 ignition[648]: parsing config with SHA512: 98093ec13bf74b9428ee5ff0743e07d66b7a52cf6d17ea692203530e99ebdeb4de949adffe8c41bd5b4581b232840aeb892f132ae242e8b2a7d9787cbcc48f8c Dec 13 13:56:17.732673 systemd[1]: Started iscsiuio.service. Dec 13 13:56:17.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:17.734194 systemd[1]: Starting iscsid.service... Dec 13 13:56:17.738284 iscsid[741]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 13:56:17.738284 iscsid[741]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 13:56:17.738284 iscsid[741]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 13:56:17.738284 iscsid[741]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 13:56:17.738284 iscsid[741]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 13:56:17.738284 iscsid[741]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 13:56:17.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:17.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:17.737930 unknown[648]: fetched base config from "system" Dec 13 13:56:17.741582 ignition[648]: fetch-offline: fetch-offline passed Dec 13 13:56:17.737940 unknown[648]: fetched user config from "qemu" Dec 13 13:56:17.741673 ignition[648]: Ignition finished successfully Dec 13 13:56:17.740527 systemd[1]: Started iscsid.service. Dec 13 13:56:17.744657 systemd[1]: Starting dracut-initqueue.service... Dec 13 13:56:17.745624 systemd-networkd[735]: eth0: DHCPv4 address 10.0.0.19/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 13:56:17.746397 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 13:56:17.747151 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 13:56:17.747811 systemd[1]: Starting ignition-kargs.service... Dec 13 13:56:17.756853 systemd[1]: Finished dracut-initqueue.service. Dec 13 13:56:17.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:17.757595 ignition[744]: Ignition 2.14.0 Dec 13 13:56:17.757558 systemd[1]: Reached target remote-fs-pre.target. Dec 13 13:56:17.757602 ignition[744]: Stage: kargs Dec 13 13:56:17.758574 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 13:56:17.757688 ignition[744]: no configs at "/usr/lib/ignition/base.d" Dec 13 13:56:17.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:17.759573 systemd[1]: Reached target remote-fs.target. Dec 13 13:56:17.757696 ignition[744]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 13:56:17.762300 systemd[1]: Starting dracut-pre-mount.service... Dec 13 13:56:17.758350 ignition[744]: kargs: kargs passed Dec 13 13:56:17.763310 systemd[1]: Finished ignition-kargs.service. Dec 13 13:56:17.758390 ignition[744]: Ignition finished successfully Dec 13 13:56:17.764948 systemd[1]: Starting ignition-disks.service... Dec 13 13:56:17.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:17.771502 systemd[1]: Finished dracut-pre-mount.service. Dec 13 13:56:17.774597 systemd[1]: Finished ignition-disks.service. Dec 13 13:56:17.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:17.773138 ignition[758]: Ignition 2.14.0 Dec 13 13:56:17.775386 systemd[1]: Reached target initrd-root-device.target. Dec 13 13:56:17.773144 ignition[758]: Stage: disks Dec 13 13:56:17.776300 systemd[1]: Reached target local-fs-pre.target. Dec 13 13:56:17.773254 ignition[758]: no configs at "/usr/lib/ignition/base.d" Dec 13 13:56:17.777203 systemd[1]: Reached target local-fs.target. Dec 13 13:56:17.773264 ignition[758]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 13:56:17.779065 systemd[1]: Reached target sysinit.target. Dec 13 13:56:17.773890 ignition[758]: disks: disks passed Dec 13 13:56:17.779869 systemd[1]: Reached target basic.target. Dec 13 13:56:17.773927 ignition[758]: Ignition finished successfully Dec 13 13:56:17.781192 systemd[1]: Starting systemd-fsck-root.service... Dec 13 13:56:17.791975 systemd-fsck[769]: ROOT: clean, 621/553520 files, 56020/553472 blocks Dec 13 13:56:17.794942 systemd[1]: Finished systemd-fsck-root.service. Dec 13 13:56:17.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:17.798636 systemd[1]: Mounting sysroot.mount... Dec 13 13:56:17.804256 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 13:56:17.804814 systemd[1]: Mounted sysroot.mount. Dec 13 13:56:17.805424 systemd[1]: Reached target initrd-root-fs.target. Dec 13 13:56:17.807292 systemd[1]: Mounting sysroot-usr.mount... Dec 13 13:56:17.808011 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 13:56:17.808046 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 13:56:17.808069 systemd[1]: Reached target ignition-diskful.target. Dec 13 13:56:17.809856 systemd[1]: Mounted sysroot-usr.mount. Dec 13 13:56:17.811202 systemd[1]: Starting initrd-setup-root.service... Dec 13 13:56:17.815869 initrd-setup-root[779]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 13:56:17.820005 initrd-setup-root[787]: cut: /sysroot/etc/group: No such file or directory Dec 13 13:56:17.823903 initrd-setup-root[795]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 13:56:17.828010 initrd-setup-root[803]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 13:56:17.854307 systemd[1]: Finished initrd-setup-root.service. Dec 13 13:56:17.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:17.855839 systemd[1]: Starting ignition-mount.service... Dec 13 13:56:17.856974 systemd[1]: Starting sysroot-boot.service... Dec 13 13:56:17.861088 bash[821]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 13:56:17.869539 ignition[823]: INFO : Ignition 2.14.0 Dec 13 13:56:17.869539 ignition[823]: INFO : Stage: mount Dec 13 13:56:17.871295 ignition[823]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 13:56:17.871295 ignition[823]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 13:56:17.871295 ignition[823]: INFO : mount: mount passed Dec 13 13:56:17.871295 ignition[823]: INFO : Ignition finished successfully Dec 13 13:56:17.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:17.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:17.872450 systemd[1]: Finished ignition-mount.service. Dec 13 13:56:17.874498 systemd[1]: Finished sysroot-boot.service. Dec 13 13:56:18.566123 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 13:56:18.572351 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (831) Dec 13 13:56:18.572399 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 13:56:18.574152 kernel: BTRFS info (device vda6): using free space tree Dec 13 13:56:18.574185 kernel: BTRFS info (device vda6): has skinny extents Dec 13 13:56:18.577123 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 13:56:18.578715 systemd[1]: Starting ignition-files.service... Dec 13 13:56:18.594031 ignition[851]: INFO : Ignition 2.14.0 Dec 13 13:56:18.594031 ignition[851]: INFO : Stage: files Dec 13 13:56:18.595373 ignition[851]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 13:56:18.595373 ignition[851]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 13:56:18.595373 ignition[851]: DEBUG : files: compiled without relabeling support, skipping Dec 13 13:56:18.598333 ignition[851]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 13:56:18.598333 ignition[851]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 13:56:18.606130 ignition[851]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 13:56:18.607216 ignition[851]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 13:56:18.607216 ignition[851]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 13:56:18.606901 unknown[851]: wrote ssh authorized keys file for user: core Dec 13 13:56:18.610173 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Dec 13 13:56:18.610173 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 13:56:18.610173 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 13:56:18.610173 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 13:56:18.610173 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Dec 13 13:56:18.610173 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Dec 13 13:56:18.610173 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Dec 13 13:56:18.610173 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-arm64.raw: attempt #1 Dec 13 13:56:18.878349 systemd-networkd[735]: eth0: Gained IPv6LL Dec 13 13:56:18.962532 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Dec 13 13:56:19.165102 ignition[851]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Dec 13 13:56:19.165102 ignition[851]: INFO : files: op(7): [started] processing unit "coreos-metadata.service" Dec 13 13:56:19.168148 ignition[851]: INFO : files: op(7): op(8): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 13:56:19.168148 ignition[851]: INFO : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 13:56:19.168148 ignition[851]: INFO : files: op(7): [finished] processing unit "coreos-metadata.service" Dec 13 13:56:19.168148 ignition[851]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 13:56:19.168148 ignition[851]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 13:56:19.196657 ignition[851]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 13:56:19.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.199669 ignition[851]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 13:56:19.199669 ignition[851]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 13:56:19.199669 ignition[851]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 13:56:19.199669 ignition[851]: INFO : files: files passed Dec 13 13:56:19.199669 ignition[851]: INFO : Ignition finished successfully Dec 13 13:56:19.198620 systemd[1]: Finished ignition-files.service. Dec 13 13:56:19.202633 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 13:56:19.203616 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 13:56:19.204230 systemd[1]: Starting ignition-quench.service... Dec 13 13:56:19.209315 initrd-setup-root-after-ignition[875]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 13:56:19.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.211864 initrd-setup-root-after-ignition[878]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 13:56:19.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.209822 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 13:56:19.209907 systemd[1]: Finished ignition-quench.service. Dec 13 13:56:19.212098 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 13:56:19.212912 systemd[1]: Reached target ignition-complete.target. Dec 13 13:56:19.214134 systemd[1]: Starting initrd-parse-etc.service... Dec 13 13:56:19.226185 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 13:56:19.226961 systemd[1]: Finished initrd-parse-etc.service. Dec 13 13:56:19.229046 systemd[1]: Reached target initrd-fs.target. Dec 13 13:56:19.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.229885 systemd[1]: Reached target initrd.target. Dec 13 13:56:19.230868 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 13:56:19.231613 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 13:56:19.241701 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 13:56:19.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.243057 systemd[1]: Starting initrd-cleanup.service... Dec 13 13:56:19.250949 systemd[1]: Stopped target nss-lookup.target. Dec 13 13:56:19.251697 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 13:56:19.252384 systemd[1]: Stopped target timers.target. Dec 13 13:56:19.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.253321 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 13:56:19.253427 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 13:56:19.254477 systemd[1]: Stopped target initrd.target. Dec 13 13:56:19.255261 systemd[1]: Stopped target basic.target. Dec 13 13:56:19.258939 systemd[1]: Stopped target ignition-complete.target. Dec 13 13:56:19.260480 systemd[1]: Stopped target ignition-diskful.target. Dec 13 13:56:19.261920 systemd[1]: Stopped target initrd-root-device.target. Dec 13 13:56:19.263451 systemd[1]: Stopped target remote-fs.target. Dec 13 13:56:19.265100 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 13:56:19.266099 systemd[1]: Stopped target sysinit.target. Dec 13 13:56:19.267090 systemd[1]: Stopped target local-fs.target. Dec 13 13:56:19.268055 systemd[1]: Stopped target local-fs-pre.target. Dec 13 13:56:19.269037 systemd[1]: Stopped target swap.target. Dec 13 13:56:19.269973 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 13:56:19.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.270083 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 13:56:19.270993 systemd[1]: Stopped target cryptsetup.target. Dec 13 13:56:19.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.272084 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 13:56:19.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.272174 systemd[1]: Stopped dracut-initqueue.service. Dec 13 13:56:19.273179 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 13:56:19.273293 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 13:56:19.274439 systemd[1]: Stopped target paths.target. Dec 13 13:56:19.275571 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 13:56:19.280320 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 13:56:19.281038 systemd[1]: Stopped target slices.target. Dec 13 13:56:19.282071 systemd[1]: Stopped target sockets.target. Dec 13 13:56:19.283067 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 13:56:19.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.283172 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 13:56:19.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.284413 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 13:56:19.284496 systemd[1]: Stopped ignition-files.service. Dec 13 13:56:19.291796 iscsid[741]: iscsid shutting down. Dec 13 13:56:19.290476 systemd[1]: Stopping ignition-mount.service... Dec 13 13:56:19.293299 systemd[1]: Stopping iscsid.service... Dec 13 13:56:19.294226 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 13:56:19.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.294362 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 13:56:19.298651 ignition[891]: INFO : Ignition 2.14.0 Dec 13 13:56:19.298651 ignition[891]: INFO : Stage: umount Dec 13 13:56:19.298651 ignition[891]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 13:56:19.298651 ignition[891]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 13:56:19.298651 ignition[891]: INFO : umount: umount passed Dec 13 13:56:19.298651 ignition[891]: INFO : Ignition finished successfully Dec 13 13:56:19.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.296186 systemd[1]: Stopping sysroot-boot.service... Dec 13 13:56:19.298104 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 13:56:19.298264 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 13:56:19.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.299293 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 13:56:19.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.299390 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 13:56:19.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.302041 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 13:56:19.302144 systemd[1]: Stopped iscsid.service. Dec 13 13:56:19.303481 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 13:56:19.303566 systemd[1]: Stopped ignition-mount.service. Dec 13 13:56:19.304581 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 13:56:19.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.304646 systemd[1]: Closed iscsid.socket. Dec 13 13:56:19.306222 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 13:56:19.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.306287 systemd[1]: Stopped ignition-disks.service. Dec 13 13:56:19.307674 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 13:56:19.307715 systemd[1]: Stopped ignition-kargs.service. Dec 13 13:56:19.308756 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 13:56:19.308794 systemd[1]: Stopped ignition-setup.service. Dec 13 13:56:19.310798 systemd[1]: Stopping iscsiuio.service... Dec 13 13:56:19.313000 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 13:56:19.314393 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 13:56:19.314483 systemd[1]: Stopped iscsiuio.service. Dec 13 13:56:19.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.315334 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 13:56:19.315407 systemd[1]: Finished initrd-cleanup.service. Dec 13 13:56:19.317479 systemd[1]: Stopped target network.target. Dec 13 13:56:19.318492 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 13:56:19.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.318524 systemd[1]: Closed iscsiuio.socket. Dec 13 13:56:19.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.319857 systemd[1]: Stopping systemd-networkd.service... Dec 13 13:56:19.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.320601 systemd[1]: Stopping systemd-resolved.service... Dec 13 13:56:19.323326 systemd-networkd[735]: eth0: DHCPv6 lease lost Dec 13 13:56:19.334000 audit: BPF prog-id=9 op=UNLOAD Dec 13 13:56:19.324402 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 13:56:19.324496 systemd[1]: Stopped systemd-networkd.service. Dec 13 13:56:19.325726 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 13:56:19.325758 systemd[1]: Closed systemd-networkd.socket. Dec 13 13:56:19.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.327193 systemd[1]: Stopping network-cleanup.service... Dec 13 13:56:19.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.328103 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 13:56:19.328156 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 13:56:19.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.330091 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 13:56:19.330135 systemd[1]: Stopped systemd-sysctl.service. Dec 13 13:56:19.342000 audit: BPF prog-id=6 op=UNLOAD Dec 13 13:56:19.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.331724 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 13:56:19.331764 systemd[1]: Stopped systemd-modules-load.service. Dec 13 13:56:19.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.332669 systemd[1]: Stopping systemd-udevd.service... Dec 13 13:56:19.336862 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 13:56:19.337350 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 13:56:19.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.337440 systemd[1]: Stopped systemd-resolved.service. Dec 13 13:56:19.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.338939 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 13:56:19.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.339016 systemd[1]: Stopped sysroot-boot.service. Dec 13 13:56:19.340299 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 13:56:19.340346 systemd[1]: Stopped initrd-setup-root.service. Dec 13 13:56:19.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.342475 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 13:56:19.342560 systemd[1]: Stopped network-cleanup.service. Dec 13 13:56:19.343898 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 13:56:19.344001 systemd[1]: Stopped systemd-udevd.service. Dec 13 13:56:19.345262 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 13:56:19.345296 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 13:56:19.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.346145 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 13:56:19.346174 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 13:56:19.347187 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 13:56:19.347227 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 13:56:19.348531 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 13:56:19.348568 systemd[1]: Stopped dracut-cmdline.service. Dec 13 13:56:19.349679 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 13:56:19.349714 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 13:56:19.351499 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 13:56:19.352382 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 13:56:19.352433 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 13:56:19.356632 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 13:56:19.356724 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 13:56:19.358046 systemd[1]: Reached target initrd-switch-root.target. Dec 13 13:56:19.359762 systemd[1]: Starting initrd-switch-root.service... Dec 13 13:56:19.366356 systemd[1]: Switching root. Dec 13 13:56:19.384409 systemd-journald[290]: Journal stopped Dec 13 13:56:21.320082 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). Dec 13 13:56:21.320138 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 13:56:21.320150 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 13:56:21.320168 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 13:56:21.320178 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 13:56:21.320192 kernel: SELinux: policy capability open_perms=1 Dec 13 13:56:21.320201 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 13:56:21.320211 kernel: SELinux: policy capability always_check_network=0 Dec 13 13:56:21.320221 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 13:56:21.320230 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 13:56:21.320258 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 13:56:21.320269 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 13:56:21.320279 systemd[1]: Successfully loaded SELinux policy in 31.882ms. Dec 13 13:56:21.320299 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.097ms. Dec 13 13:56:21.320312 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 13:56:21.320323 systemd[1]: Detected virtualization kvm. Dec 13 13:56:21.320333 systemd[1]: Detected architecture arm64. Dec 13 13:56:21.320344 systemd[1]: Detected first boot. Dec 13 13:56:21.320354 systemd[1]: Initializing machine ID from VM UUID. Dec 13 13:56:21.320365 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 13:56:21.320375 systemd[1]: Populated /etc with preset unit settings. Dec 13 13:56:21.320386 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 13:56:21.320398 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 13:56:21.320410 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 13:56:21.320423 kernel: kauditd_printk_skb: 80 callbacks suppressed Dec 13 13:56:21.320433 kernel: audit: type=1334 audit(1734098181.205:84): prog-id=12 op=LOAD Dec 13 13:56:21.320444 kernel: audit: type=1334 audit(1734098181.205:85): prog-id=3 op=UNLOAD Dec 13 13:56:21.320454 kernel: audit: type=1334 audit(1734098181.205:86): prog-id=13 op=LOAD Dec 13 13:56:21.320463 kernel: audit: type=1334 audit(1734098181.206:87): prog-id=14 op=LOAD Dec 13 13:56:21.320474 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 13:56:21.320484 kernel: audit: type=1334 audit(1734098181.206:88): prog-id=4 op=UNLOAD Dec 13 13:56:21.320494 kernel: audit: type=1334 audit(1734098181.206:89): prog-id=5 op=UNLOAD Dec 13 13:56:21.320504 kernel: audit: type=1131 audit(1734098181.207:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.320514 systemd[1]: Stopped initrd-switch-root.service. Dec 13 13:56:21.320529 kernel: audit: type=1130 audit(1734098181.213:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.320539 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 13:56:21.320550 kernel: audit: type=1131 audit(1734098181.213:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.320561 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 13:56:21.320571 kernel: audit: type=1334 audit(1734098181.219:93): prog-id=12 op=UNLOAD Dec 13 13:56:21.320583 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 13:56:21.320594 systemd[1]: Created slice system-getty.slice. Dec 13 13:56:21.320604 systemd[1]: Created slice system-modprobe.slice. Dec 13 13:56:21.320615 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 13:56:21.320625 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 13:56:21.320635 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 13:56:21.320647 systemd[1]: Created slice user.slice. Dec 13 13:56:21.320658 systemd[1]: Started systemd-ask-password-console.path. Dec 13 13:56:21.320669 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 13:56:21.320679 systemd[1]: Set up automount boot.automount. Dec 13 13:56:21.320690 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 13:56:21.320700 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 13:56:21.320710 systemd[1]: Stopped target initrd-fs.target. Dec 13 13:56:21.320721 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 13:56:21.320732 systemd[1]: Reached target integritysetup.target. Dec 13 13:56:21.320742 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 13:56:21.320753 systemd[1]: Reached target remote-fs.target. Dec 13 13:56:21.320763 systemd[1]: Reached target slices.target. Dec 13 13:56:21.320773 systemd[1]: Reached target swap.target. Dec 13 13:56:21.320784 systemd[1]: Reached target torcx.target. Dec 13 13:56:21.320794 systemd[1]: Reached target veritysetup.target. Dec 13 13:56:21.320806 systemd[1]: Listening on systemd-coredump.socket. Dec 13 13:56:21.320820 systemd[1]: Listening on systemd-initctl.socket. Dec 13 13:56:21.320831 systemd[1]: Listening on systemd-networkd.socket. Dec 13 13:56:21.320841 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 13:56:21.320852 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 13:56:21.320862 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 13:56:21.320872 systemd[1]: Mounting dev-hugepages.mount... Dec 13 13:56:21.320883 systemd[1]: Mounting dev-mqueue.mount... Dec 13 13:56:21.320894 systemd[1]: Mounting media.mount... Dec 13 13:56:21.320904 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 13:56:21.320916 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 13:56:21.320926 systemd[1]: Mounting tmp.mount... Dec 13 13:56:21.320937 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 13:56:21.320947 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 13:56:21.320957 systemd[1]: Starting kmod-static-nodes.service... Dec 13 13:56:21.320968 systemd[1]: Starting modprobe@configfs.service... Dec 13 13:56:21.320978 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 13:56:21.320989 systemd[1]: Starting modprobe@drm.service... Dec 13 13:56:21.320999 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 13:56:21.321011 systemd[1]: Starting modprobe@fuse.service... Dec 13 13:56:21.321021 systemd[1]: Starting modprobe@loop.service... Dec 13 13:56:21.321032 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 13:56:21.321042 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 13:56:21.321052 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 13:56:21.321062 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 13:56:21.321072 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 13:56:21.321082 systemd[1]: Stopped systemd-journald.service. Dec 13 13:56:21.321092 kernel: fuse: init (API version 7.34) Dec 13 13:56:21.321103 systemd[1]: Starting systemd-journald.service... Dec 13 13:56:21.321114 kernel: loop: module loaded Dec 13 13:56:21.321124 systemd[1]: Starting systemd-modules-load.service... Dec 13 13:56:21.321134 systemd[1]: Starting systemd-network-generator.service... Dec 13 13:56:21.321144 systemd[1]: Starting systemd-remount-fs.service... Dec 13 13:56:21.321154 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 13:56:21.321165 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 13:56:21.321176 systemd[1]: Stopped verity-setup.service. Dec 13 13:56:21.321187 systemd[1]: Mounted dev-hugepages.mount. Dec 13 13:56:21.321198 systemd[1]: Mounted dev-mqueue.mount. Dec 13 13:56:21.321208 systemd[1]: Mounted media.mount. Dec 13 13:56:21.321218 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 13:56:21.321228 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 13:56:21.321247 systemd[1]: Mounted tmp.mount. Dec 13 13:56:21.321260 systemd-journald[986]: Journal started Dec 13 13:56:21.321300 systemd-journald[986]: Runtime Journal (/run/log/journal/9587e49f8565403398c36de36bbc2b00) is 6.0M, max 48.7M, 42.6M free. Dec 13 13:56:19.443000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 13:56:19.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 13:56:19.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 13:56:19.511000 audit: BPF prog-id=10 op=LOAD Dec 13 13:56:19.511000 audit: BPF prog-id=10 op=UNLOAD Dec 13 13:56:19.511000 audit: BPF prog-id=11 op=LOAD Dec 13 13:56:19.511000 audit: BPF prog-id=11 op=UNLOAD Dec 13 13:56:19.549000 audit[924]: AVC avc: denied { associate } for pid=924 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 13:56:19.549000 audit[924]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400018d8dc a1=4000028e40 a2=4000027100 a3=32 items=0 ppid=907 pid=924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:19.549000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 13:56:19.550000 audit[924]: AVC avc: denied { associate } for pid=924 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 13:56:19.550000 audit[924]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=400018d9b5 a2=1ed a3=0 items=2 ppid=907 pid=924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:19.550000 audit: CWD cwd="/" Dec 13 13:56:19.550000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:56:19.550000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:56:19.550000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 13:56:21.205000 audit: BPF prog-id=12 op=LOAD Dec 13 13:56:21.205000 audit: BPF prog-id=3 op=UNLOAD Dec 13 13:56:21.205000 audit: BPF prog-id=13 op=LOAD Dec 13 13:56:21.206000 audit: BPF prog-id=14 op=LOAD Dec 13 13:56:21.206000 audit: BPF prog-id=4 op=UNLOAD Dec 13 13:56:21.206000 audit: BPF prog-id=5 op=UNLOAD Dec 13 13:56:21.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.219000 audit: BPF prog-id=12 op=UNLOAD Dec 13 13:56:21.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.295000 audit: BPF prog-id=15 op=LOAD Dec 13 13:56:21.299000 audit: BPF prog-id=16 op=LOAD Dec 13 13:56:21.299000 audit: BPF prog-id=17 op=LOAD Dec 13 13:56:21.299000 audit: BPF prog-id=13 op=UNLOAD Dec 13 13:56:21.299000 audit: BPF prog-id=14 op=UNLOAD Dec 13 13:56:21.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.318000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 13:56:21.318000 audit[986]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffe6e63ec0 a2=4000 a3=1 items=0 ppid=1 pid=986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:21.318000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 13:56:21.203806 systemd[1]: Queued start job for default target multi-user.target. Dec 13 13:56:19.548137 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 13:56:21.203828 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 13:56:19.548406 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 13:56:21.207324 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 13:56:19.548424 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 13:56:21.322619 systemd[1]: Started systemd-journald.service. Dec 13 13:56:19.548455 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 13:56:21.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:19.548464 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 13:56:19.548497 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 13:56:19.548508 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 13:56:19.548698 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 13:56:19.548734 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 13:56:19.548747 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 13:56:19.549142 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 13:56:19.549174 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 13:56:19.549191 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 13:56:19.549205 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 13:56:19.549221 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 13:56:19.549246 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 13:56:20.962618 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:20Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 13:56:20.962884 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:20Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 13:56:20.962985 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:20Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 13:56:20.963144 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:20Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 13:56:20.963190 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:20Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 13:56:20.963264 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:20Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 13:56:21.325136 systemd[1]: Finished kmod-static-nodes.service. Dec 13 13:56:21.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.326319 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 13:56:21.326470 systemd[1]: Finished modprobe@configfs.service. Dec 13 13:56:21.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.327337 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 13:56:21.327495 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 13:56:21.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.328496 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 13:56:21.328655 systemd[1]: Finished modprobe@drm.service. Dec 13 13:56:21.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.329479 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 13:56:21.329621 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 13:56:21.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.330489 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 13:56:21.330633 systemd[1]: Finished modprobe@fuse.service. Dec 13 13:56:21.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.331515 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 13:56:21.331632 systemd[1]: Finished modprobe@loop.service. Dec 13 13:56:21.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.332468 systemd[1]: Finished systemd-modules-load.service. Dec 13 13:56:21.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.333374 systemd[1]: Finished systemd-network-generator.service. Dec 13 13:56:21.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.334347 systemd[1]: Finished systemd-remount-fs.service. Dec 13 13:56:21.335418 systemd[1]: Reached target network-pre.target. Dec 13 13:56:21.337500 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 13:56:21.339115 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 13:56:21.339776 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 13:56:21.342361 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 13:56:21.343988 systemd[1]: Starting systemd-journal-flush.service... Dec 13 13:56:21.344699 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 13:56:21.345798 systemd[1]: Starting systemd-random-seed.service... Dec 13 13:56:21.346563 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 13:56:21.351373 systemd-journald[986]: Time spent on flushing to /var/log/journal/9587e49f8565403398c36de36bbc2b00 is 11.797ms for 967 entries. Dec 13 13:56:21.351373 systemd-journald[986]: System Journal (/var/log/journal/9587e49f8565403398c36de36bbc2b00) is 8.0M, max 195.6M, 187.6M free. Dec 13 13:56:21.377644 systemd-journald[986]: Received client request to flush runtime journal. Dec 13 13:56:21.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.347680 systemd[1]: Starting systemd-sysctl.service... Dec 13 13:56:21.350993 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 13:56:21.352481 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 13:56:21.353452 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 13:56:21.378353 udevadm[1024]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 13:56:21.355191 systemd[1]: Starting systemd-sysusers.service... Dec 13 13:56:21.356368 systemd[1]: Finished systemd-random-seed.service. Dec 13 13:56:21.358156 systemd[1]: Reached target first-boot-complete.target. Dec 13 13:56:21.361403 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 13:56:21.363070 systemd[1]: Starting systemd-udev-settle.service... Dec 13 13:56:21.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.379569 systemd[1]: Finished systemd-journal-flush.service. Dec 13 13:56:21.381328 systemd[1]: Finished systemd-sysctl.service. Dec 13 13:56:21.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.382291 systemd[1]: Finished systemd-sysusers.service. Dec 13 13:56:21.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.713746 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 13:56:21.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.714000 audit: BPF prog-id=18 op=LOAD Dec 13 13:56:21.714000 audit: BPF prog-id=19 op=LOAD Dec 13 13:56:21.714000 audit: BPF prog-id=7 op=UNLOAD Dec 13 13:56:21.715000 audit: BPF prog-id=8 op=UNLOAD Dec 13 13:56:21.716035 systemd[1]: Starting systemd-udevd.service... Dec 13 13:56:21.735782 systemd-udevd[1027]: Using default interface naming scheme 'v252'. Dec 13 13:56:21.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.747328 systemd[1]: Started systemd-udevd.service. Dec 13 13:56:21.748000 audit: BPF prog-id=20 op=LOAD Dec 13 13:56:21.749650 systemd[1]: Starting systemd-networkd.service... Dec 13 13:56:21.761000 audit: BPF prog-id=21 op=LOAD Dec 13 13:56:21.761000 audit: BPF prog-id=22 op=LOAD Dec 13 13:56:21.761000 audit: BPF prog-id=23 op=LOAD Dec 13 13:56:21.762533 systemd[1]: Starting systemd-userdbd.service... Dec 13 13:56:21.773700 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Dec 13 13:56:21.800178 systemd[1]: Started systemd-userdbd.service. Dec 13 13:56:21.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.810566 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 13:56:21.857598 systemd[1]: Finished systemd-udev-settle.service. Dec 13 13:56:21.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.858905 systemd-networkd[1035]: lo: Link UP Dec 13 13:56:21.858917 systemd-networkd[1035]: lo: Gained carrier Dec 13 13:56:21.859602 systemd[1]: Starting lvm2-activation-early.service... Dec 13 13:56:21.861091 systemd-networkd[1035]: Enumeration completed Dec 13 13:56:21.861182 systemd[1]: Started systemd-networkd.service. Dec 13 13:56:21.862101 systemd-networkd[1035]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 13:56:21.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.865343 systemd-networkd[1035]: eth0: Link UP Dec 13 13:56:21.865354 systemd-networkd[1035]: eth0: Gained carrier Dec 13 13:56:21.877860 lvm[1060]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 13:56:21.888370 systemd-networkd[1035]: eth0: DHCPv4 address 10.0.0.19/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 13:56:21.914156 systemd[1]: Finished lvm2-activation-early.service. Dec 13 13:56:21.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.915012 systemd[1]: Reached target cryptsetup.target. Dec 13 13:56:21.916839 systemd[1]: Starting lvm2-activation.service... Dec 13 13:56:21.920396 lvm[1061]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 13:56:21.952211 systemd[1]: Finished lvm2-activation.service. Dec 13 13:56:21.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.952981 systemd[1]: Reached target local-fs-pre.target. Dec 13 13:56:21.953628 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 13:56:21.953656 systemd[1]: Reached target local-fs.target. Dec 13 13:56:21.954217 systemd[1]: Reached target machines.target. Dec 13 13:56:21.955993 systemd[1]: Starting ldconfig.service... Dec 13 13:56:21.956905 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 13:56:21.956961 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:56:21.957984 systemd[1]: Starting systemd-boot-update.service... Dec 13 13:56:21.959759 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 13:56:21.961667 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 13:56:21.964385 systemd[1]: Starting systemd-sysext.service... Dec 13 13:56:21.965231 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1063 (bootctl) Dec 13 13:56:21.966592 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 13:56:21.970135 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 13:56:21.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:21.980799 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 13:56:21.984434 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 13:56:21.984621 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 13:56:21.994263 kernel: loop0: detected capacity change from 0 to 194096 Dec 13 13:56:22.034255 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 13:56:22.034840 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 13:56:22.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.040078 systemd-fsck[1070]: fsck.fat 4.2 (2021-01-31) Dec 13 13:56:22.040078 systemd-fsck[1070]: /dev/vda1: 236 files, 117175/258078 clusters Dec 13 13:56:22.043310 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 13:56:22.046589 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 13:56:22.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.048728 systemd[1]: Mounting boot.mount... Dec 13 13:56:22.056156 systemd[1]: Mounted boot.mount. Dec 13 13:56:22.061293 kernel: loop1: detected capacity change from 0 to 194096 Dec 13 13:56:22.064032 systemd[1]: Finished systemd-boot-update.service. Dec 13 13:56:22.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.067523 (sd-sysext)[1076]: Using extensions 'kubernetes'. Dec 13 13:56:22.068327 (sd-sysext)[1076]: Merged extensions into '/usr'. Dec 13 13:56:22.085987 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 13:56:22.087549 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 13:56:22.089781 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 13:56:22.091559 systemd[1]: Starting modprobe@loop.service... Dec 13 13:56:22.092361 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 13:56:22.092495 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:56:22.093264 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 13:56:22.093393 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 13:56:22.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.094584 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 13:56:22.094700 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 13:56:22.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.095942 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 13:56:22.096053 systemd[1]: Finished modprobe@loop.service. Dec 13 13:56:22.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.097207 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 13:56:22.097360 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 13:56:22.129209 ldconfig[1062]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 13:56:22.132920 systemd[1]: Finished ldconfig.service. Dec 13 13:56:22.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.316385 systemd[1]: Mounting usr-share-oem.mount... Dec 13 13:56:22.321209 systemd[1]: Mounted usr-share-oem.mount. Dec 13 13:56:22.322892 systemd[1]: Finished systemd-sysext.service. Dec 13 13:56:22.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.324768 systemd[1]: Starting ensure-sysext.service... Dec 13 13:56:22.326278 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 13:56:22.330530 systemd[1]: Reloading. Dec 13 13:56:22.341569 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 13:56:22.345253 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 13:56:22.348053 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 13:56:22.372280 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-12-13T13:56:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 13:56:22.372310 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-12-13T13:56:22Z" level=info msg="torcx already run" Dec 13 13:56:22.441329 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 13:56:22.441341 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 13:56:22.457338 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 13:56:22.501000 audit: BPF prog-id=24 op=LOAD Dec 13 13:56:22.501000 audit: BPF prog-id=25 op=LOAD Dec 13 13:56:22.501000 audit: BPF prog-id=18 op=UNLOAD Dec 13 13:56:22.501000 audit: BPF prog-id=19 op=UNLOAD Dec 13 13:56:22.502000 audit: BPF prog-id=26 op=LOAD Dec 13 13:56:22.502000 audit: BPF prog-id=20 op=UNLOAD Dec 13 13:56:22.503000 audit: BPF prog-id=27 op=LOAD Dec 13 13:56:22.503000 audit: BPF prog-id=15 op=UNLOAD Dec 13 13:56:22.503000 audit: BPF prog-id=28 op=LOAD Dec 13 13:56:22.503000 audit: BPF prog-id=29 op=LOAD Dec 13 13:56:22.503000 audit: BPF prog-id=16 op=UNLOAD Dec 13 13:56:22.503000 audit: BPF prog-id=17 op=UNLOAD Dec 13 13:56:22.503000 audit: BPF prog-id=30 op=LOAD Dec 13 13:56:22.503000 audit: BPF prog-id=21 op=UNLOAD Dec 13 13:56:22.504000 audit: BPF prog-id=31 op=LOAD Dec 13 13:56:22.504000 audit: BPF prog-id=32 op=LOAD Dec 13 13:56:22.504000 audit: BPF prog-id=22 op=UNLOAD Dec 13 13:56:22.504000 audit: BPF prog-id=23 op=UNLOAD Dec 13 13:56:22.506154 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 13:56:22.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.510493 systemd[1]: Starting audit-rules.service... Dec 13 13:56:22.512475 systemd[1]: Starting clean-ca-certificates.service... Dec 13 13:56:22.514363 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 13:56:22.516000 audit: BPF prog-id=33 op=LOAD Dec 13 13:56:22.518000 audit: BPF prog-id=34 op=LOAD Dec 13 13:56:22.517738 systemd[1]: Starting systemd-resolved.service... Dec 13 13:56:22.520178 systemd[1]: Starting systemd-timesyncd.service... Dec 13 13:56:22.522379 systemd[1]: Starting systemd-update-utmp.service... Dec 13 13:56:22.523557 systemd[1]: Finished clean-ca-certificates.service. Dec 13 13:56:22.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.526473 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 13:56:22.528000 audit[1153]: SYSTEM_BOOT pid=1153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.532938 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 13:56:22.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.535744 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 13:56:22.536982 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 13:56:22.538636 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 13:56:22.540223 systemd[1]: Starting modprobe@loop.service... Dec 13 13:56:22.540883 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 13:56:22.541009 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:56:22.542183 systemd[1]: Starting systemd-update-done.service... Dec 13 13:56:22.543140 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 13:56:22.544109 systemd[1]: Finished systemd-update-utmp.service. Dec 13 13:56:22.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.545286 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 13:56:22.545399 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 13:56:22.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.546450 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 13:56:22.546562 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 13:56:22.547618 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 13:56:22.547731 systemd[1]: Finished modprobe@loop.service. Dec 13 13:56:22.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.550657 systemd[1]: Finished systemd-update-done.service. Dec 13 13:56:22.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.551917 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 13:56:22.553059 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 13:56:22.554801 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 13:56:22.556674 systemd[1]: Starting modprobe@loop.service... Dec 13 13:56:22.557311 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 13:56:22.557432 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:56:22.557522 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 13:56:22.558389 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 13:56:22.558530 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 13:56:22.559550 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 13:56:22.559661 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 13:56:22.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.560653 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 13:56:22.560765 systemd[1]: Finished modprobe@loop.service. Dec 13 13:56:22.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.562046 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 13:56:22.562138 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 13:56:22.564395 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 13:56:22.565551 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 13:56:22.567343 systemd[1]: Starting modprobe@drm.service... Dec 13 13:56:22.569064 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 13:56:22.570787 systemd[1]: Starting modprobe@loop.service... Dec 13 13:56:22.571734 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 13:56:22.571864 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:56:22.573036 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 13:56:22.574038 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 13:56:22.575014 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 13:56:22.575133 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 13:56:22.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:22.578294 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 13:56:22.578418 systemd[1]: Finished modprobe@drm.service. Dec 13 13:56:22.578000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 13:56:22.578000 audit[1175]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc2ef0560 a2=420 a3=0 items=0 ppid=1142 pid=1175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:22.578000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 13:56:22.579299 augenrules[1175]: No rules Dec 13 13:56:22.578870 systemd-resolved[1146]: Positive Trust Anchors: Dec 13 13:56:22.578879 systemd-resolved[1146]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 13:56:22.578905 systemd-resolved[1146]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 13:56:22.580861 systemd[1]: Finished audit-rules.service. Dec 13 13:56:22.583428 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 13:56:22.583563 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 13:56:22.585626 systemd[1]: Started systemd-timesyncd.service. Dec 13 13:56:22.586585 systemd-timesyncd[1147]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 13:56:22.586883 systemd-timesyncd[1147]: Initial clock synchronization to Fri 2024-12-13 13:56:22.356215 UTC. Dec 13 13:56:22.587286 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 13:56:22.587420 systemd[1]: Finished modprobe@loop.service. Dec 13 13:56:22.588744 systemd[1]: Reached target time-set.target. Dec 13 13:56:22.589476 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 13:56:22.589523 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 13:56:22.590667 systemd[1]: Finished ensure-sysext.service. Dec 13 13:56:22.591616 systemd-resolved[1146]: Defaulting to hostname 'linux'. Dec 13 13:56:22.593041 systemd[1]: Started systemd-resolved.service. Dec 13 13:56:22.593727 systemd[1]: Reached target network.target. Dec 13 13:56:22.594311 systemd[1]: Reached target nss-lookup.target. Dec 13 13:56:22.594888 systemd[1]: Reached target sysinit.target. Dec 13 13:56:22.595574 systemd[1]: Started motdgen.path. Dec 13 13:56:22.596118 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 13:56:22.597152 systemd[1]: Started logrotate.timer. Dec 13 13:56:22.597820 systemd[1]: Started mdadm.timer. Dec 13 13:56:22.598338 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 13:56:22.598938 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 13:56:22.598967 systemd[1]: Reached target paths.target. Dec 13 13:56:22.599504 systemd[1]: Reached target timers.target. Dec 13 13:56:22.600377 systemd[1]: Listening on dbus.socket. Dec 13 13:56:22.602011 systemd[1]: Starting docker.socket... Dec 13 13:56:22.605339 systemd[1]: Listening on sshd.socket. Dec 13 13:56:22.606029 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:56:22.606484 systemd[1]: Listening on docker.socket. Dec 13 13:56:22.607150 systemd[1]: Reached target sockets.target. Dec 13 13:56:22.607750 systemd[1]: Reached target basic.target. Dec 13 13:56:22.608338 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 13:56:22.608372 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 13:56:22.609455 systemd[1]: Starting containerd.service... Dec 13 13:56:22.611063 systemd[1]: Starting dbus.service... Dec 13 13:56:22.612781 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 13:56:22.614638 systemd[1]: Starting extend-filesystems.service... Dec 13 13:56:22.615586 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 13:56:22.619931 systemd[1]: Starting motdgen.service... Dec 13 13:56:22.621890 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 13:56:22.623802 systemd[1]: Starting sshd-keygen.service... Dec 13 13:56:22.626465 systemd[1]: Starting systemd-logind.service... Dec 13 13:56:22.627197 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 13:56:22.627363 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 13:56:22.627877 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 13:56:22.628622 systemd[1]: Starting update-engine.service... Dec 13 13:56:22.629418 jq[1185]: false Dec 13 13:56:22.630775 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 13:56:22.633406 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 13:56:22.633608 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 13:56:22.634041 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 13:56:22.634204 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 13:56:22.637293 jq[1198]: true Dec 13 13:56:22.642156 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 13:56:22.642343 systemd[1]: Finished motdgen.service. Dec 13 13:56:22.655041 dbus-daemon[1184]: [system] SELinux support is enabled Dec 13 13:56:22.655272 systemd[1]: Started dbus.service. Dec 13 13:56:22.657328 jq[1204]: true Dec 13 13:56:22.658840 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 13:56:22.658886 systemd[1]: Reached target system-config.target. Dec 13 13:56:22.659587 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 13:56:22.659612 systemd[1]: Reached target user-config.target. Dec 13 13:56:22.660077 extend-filesystems[1186]: Found loop1 Dec 13 13:56:22.661119 extend-filesystems[1186]: Found vda Dec 13 13:56:22.661119 extend-filesystems[1186]: Found vda1 Dec 13 13:56:22.661119 extend-filesystems[1186]: Found vda2 Dec 13 13:56:22.661119 extend-filesystems[1186]: Found vda3 Dec 13 13:56:22.661119 extend-filesystems[1186]: Found usr Dec 13 13:56:22.661119 extend-filesystems[1186]: Found vda4 Dec 13 13:56:22.661119 extend-filesystems[1186]: Found vda6 Dec 13 13:56:22.661119 extend-filesystems[1186]: Found vda7 Dec 13 13:56:22.661119 extend-filesystems[1186]: Found vda9 Dec 13 13:56:22.661119 extend-filesystems[1186]: Checking size of /dev/vda9 Dec 13 13:56:22.691533 extend-filesystems[1186]: Resized partition /dev/vda9 Dec 13 13:56:22.708313 extend-filesystems[1231]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 13:56:22.717115 systemd-logind[1194]: Watching system buttons on /dev/input/event0 (Power Button) Dec 13 13:56:22.717352 systemd-logind[1194]: New seat seat0. Dec 13 13:56:22.718264 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 13:56:22.727483 systemd[1]: Started systemd-logind.service. Dec 13 13:56:22.732159 update_engine[1197]: I1213 13:56:22.731906 1197 main.cc:92] Flatcar Update Engine starting Dec 13 13:56:22.752976 update_engine[1197]: I1213 13:56:22.739048 1197 update_check_scheduler.cc:74] Next update check in 9m43s Dec 13 13:56:22.739019 systemd[1]: Started update-engine.service. Dec 13 13:56:22.742120 systemd[1]: Started locksmithd.service. Dec 13 13:56:22.754749 env[1206]: time="2024-12-13T13:56:22.754697880Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 13:56:22.767258 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 13:56:22.768414 bash[1230]: Updated "/home/core/.ssh/authorized_keys" Dec 13 13:56:22.785296 env[1206]: time="2024-12-13T13:56:22.775275640Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 13:56:22.769470 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 13:56:22.785423 extend-filesystems[1231]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 13:56:22.785423 extend-filesystems[1231]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 13:56:22.785423 extend-filesystems[1231]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 13:56:22.789093 env[1206]: time="2024-12-13T13:56:22.785309360Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 13:56:22.789093 env[1206]: time="2024-12-13T13:56:22.788566800Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 13:56:22.789093 env[1206]: time="2024-12-13T13:56:22.788595320Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 13:56:22.789093 env[1206]: time="2024-12-13T13:56:22.788980320Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 13:56:22.789093 env[1206]: time="2024-12-13T13:56:22.789003920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 13:56:22.789093 env[1206]: time="2024-12-13T13:56:22.789017560Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 13:56:22.789093 env[1206]: time="2024-12-13T13:56:22.789026680Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 13:56:22.786574 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 13:56:22.789472 extend-filesystems[1186]: Resized filesystem in /dev/vda9 Dec 13 13:56:22.790559 env[1206]: time="2024-12-13T13:56:22.789110800Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 13:56:22.790559 env[1206]: time="2024-12-13T13:56:22.789366440Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 13:56:22.790559 env[1206]: time="2024-12-13T13:56:22.789501280Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 13:56:22.790559 env[1206]: time="2024-12-13T13:56:22.789516840Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 13:56:22.790559 env[1206]: time="2024-12-13T13:56:22.789571160Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 13:56:22.790559 env[1206]: time="2024-12-13T13:56:22.789584440Z" level=info msg="metadata content store policy set" policy=shared Dec 13 13:56:22.786740 systemd[1]: Finished extend-filesystems.service. Dec 13 13:56:22.793495 env[1206]: time="2024-12-13T13:56:22.793459520Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 13:56:22.793495 env[1206]: time="2024-12-13T13:56:22.793495360Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 13:56:22.793576 env[1206]: time="2024-12-13T13:56:22.793509960Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 13:56:22.793576 env[1206]: time="2024-12-13T13:56:22.793552480Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 13:56:22.793576 env[1206]: time="2024-12-13T13:56:22.793569600Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 13:56:22.793645 env[1206]: time="2024-12-13T13:56:22.793583520Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 13:56:22.793679 env[1206]: time="2024-12-13T13:56:22.793663040Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 13:56:22.794084 env[1206]: time="2024-12-13T13:56:22.794055640Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 13:56:22.794084 env[1206]: time="2024-12-13T13:56:22.794081360Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 13:56:22.794136 env[1206]: time="2024-12-13T13:56:22.794096760Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 13:56:22.794136 env[1206]: time="2024-12-13T13:56:22.794110600Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 13:56:22.794136 env[1206]: time="2024-12-13T13:56:22.794130880Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 13:56:22.794304 env[1206]: time="2024-12-13T13:56:22.794277560Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 13:56:22.794437 env[1206]: time="2024-12-13T13:56:22.794370800Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 13:56:22.794711 env[1206]: time="2024-12-13T13:56:22.794659040Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 13:56:22.794711 env[1206]: time="2024-12-13T13:56:22.794699760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 13:56:22.794772 env[1206]: time="2024-12-13T13:56:22.794713840Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 13:56:22.794945 env[1206]: time="2024-12-13T13:56:22.794931600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 13:56:22.794968 env[1206]: time="2024-12-13T13:56:22.794949600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 13:56:22.794968 env[1206]: time="2024-12-13T13:56:22.794964200Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 13:56:22.795040 env[1206]: time="2024-12-13T13:56:22.794976240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 13:56:22.795066 env[1206]: time="2024-12-13T13:56:22.795047000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 13:56:22.795066 env[1206]: time="2024-12-13T13:56:22.795060680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 13:56:22.795115 env[1206]: time="2024-12-13T13:56:22.795075760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 13:56:22.795115 env[1206]: time="2024-12-13T13:56:22.795088000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 13:56:22.795115 env[1206]: time="2024-12-13T13:56:22.795107400Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 13:56:22.795270 env[1206]: time="2024-12-13T13:56:22.795254600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 13:56:22.795294 env[1206]: time="2024-12-13T13:56:22.795277400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 13:56:22.795294 env[1206]: time="2024-12-13T13:56:22.795290160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 13:56:22.795331 env[1206]: time="2024-12-13T13:56:22.795301720Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 13:56:22.795331 env[1206]: time="2024-12-13T13:56:22.795322280Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 13:56:22.795375 env[1206]: time="2024-12-13T13:56:22.795333760Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 13:56:22.795375 env[1206]: time="2024-12-13T13:56:22.795351360Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 13:56:22.795413 env[1206]: time="2024-12-13T13:56:22.795385000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 13:56:22.795653 env[1206]: time="2024-12-13T13:56:22.795596320Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 13:56:22.796662 env[1206]: time="2024-12-13T13:56:22.795667360Z" level=info msg="Connect containerd service" Dec 13 13:56:22.796662 env[1206]: time="2024-12-13T13:56:22.795704840Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 13:56:22.796662 env[1206]: time="2024-12-13T13:56:22.796605440Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 13:56:22.796830 env[1206]: time="2024-12-13T13:56:22.796792320Z" level=info msg="Start subscribing containerd event" Dec 13 13:56:22.796856 env[1206]: time="2024-12-13T13:56:22.796843520Z" level=info msg="Start recovering state" Dec 13 13:56:22.796912 env[1206]: time="2024-12-13T13:56:22.796900800Z" level=info msg="Start event monitor" Dec 13 13:56:22.796934 env[1206]: time="2024-12-13T13:56:22.796922120Z" level=info msg="Start snapshots syncer" Dec 13 13:56:22.796934 env[1206]: time="2024-12-13T13:56:22.796931080Z" level=info msg="Start cni network conf syncer for default" Dec 13 13:56:22.796987 env[1206]: time="2024-12-13T13:56:22.796938480Z" level=info msg="Start streaming server" Dec 13 13:56:22.797429 env[1206]: time="2024-12-13T13:56:22.797383440Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 13:56:22.797463 env[1206]: time="2024-12-13T13:56:22.797449440Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 13:56:22.797615 systemd[1]: Started containerd.service. Dec 13 13:56:22.801626 env[1206]: time="2024-12-13T13:56:22.801390160Z" level=info msg="containerd successfully booted in 0.060418s" Dec 13 13:56:22.806081 locksmithd[1233]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 13:56:23.806410 systemd-networkd[1035]: eth0: Gained IPv6LL Dec 13 13:56:23.808305 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 13:56:23.809275 systemd[1]: Reached target network-online.target. Dec 13 13:56:23.813350 systemd[1]: Starting kubelet.service... Dec 13 13:56:24.323178 systemd[1]: Started kubelet.service. Dec 13 13:56:24.781983 kubelet[1247]: E1213 13:56:24.781881 1247 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 13:56:24.783815 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 13:56:24.783947 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 13:56:24.972899 sshd_keygen[1205]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 13:56:24.989650 systemd[1]: Finished sshd-keygen.service. Dec 13 13:56:24.991751 systemd[1]: Starting issuegen.service... Dec 13 13:56:24.996197 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 13:56:24.996372 systemd[1]: Finished issuegen.service. Dec 13 13:56:24.998482 systemd[1]: Starting systemd-user-sessions.service... Dec 13 13:56:25.004247 systemd[1]: Finished systemd-user-sessions.service. Dec 13 13:56:25.006402 systemd[1]: Started getty@tty1.service. Dec 13 13:56:25.008337 systemd[1]: Started serial-getty@ttyAMA0.service. Dec 13 13:56:25.009164 systemd[1]: Reached target getty.target. Dec 13 13:56:25.009861 systemd[1]: Reached target multi-user.target. Dec 13 13:56:25.011624 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 13:56:25.018120 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 13:56:25.018289 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 13:56:25.019091 systemd[1]: Startup finished in 564ms (kernel) + 3.836s (initrd) + 5.611s (userspace) = 10.011s. Dec 13 13:56:28.102936 systemd[1]: Created slice system-sshd.slice. Dec 13 13:56:28.104254 systemd[1]: Started sshd@0-10.0.0.19:22-10.0.0.1:56734.service. Dec 13 13:56:28.146105 sshd[1271]: Accepted publickey for core from 10.0.0.1 port 56734 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:56:28.148480 sshd[1271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:56:28.156277 systemd[1]: Created slice user-500.slice. Dec 13 13:56:28.157382 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 13:56:28.159300 systemd-logind[1194]: New session 1 of user core. Dec 13 13:56:28.166996 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 13:56:28.168380 systemd[1]: Starting user@500.service... Dec 13 13:56:28.172844 (systemd)[1274]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:56:28.232169 systemd[1274]: Queued start job for default target default.target. Dec 13 13:56:28.232688 systemd[1274]: Reached target paths.target. Dec 13 13:56:28.232707 systemd[1274]: Reached target sockets.target. Dec 13 13:56:28.232718 systemd[1274]: Reached target timers.target. Dec 13 13:56:28.232728 systemd[1274]: Reached target basic.target. Dec 13 13:56:28.232779 systemd[1274]: Reached target default.target. Dec 13 13:56:28.232805 systemd[1274]: Startup finished in 54ms. Dec 13 13:56:28.232866 systemd[1]: Started user@500.service. Dec 13 13:56:28.233832 systemd[1]: Started session-1.scope. Dec 13 13:56:28.283606 systemd[1]: Started sshd@1-10.0.0.19:22-10.0.0.1:56750.service. Dec 13 13:56:28.315566 sshd[1283]: Accepted publickey for core from 10.0.0.1 port 56750 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:56:28.317119 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:56:28.320716 systemd-logind[1194]: New session 2 of user core. Dec 13 13:56:28.321865 systemd[1]: Started session-2.scope. Dec 13 13:56:28.380881 sshd[1283]: pam_unix(sshd:session): session closed for user core Dec 13 13:56:28.383391 systemd[1]: sshd@1-10.0.0.19:22-10.0.0.1:56750.service: Deactivated successfully. Dec 13 13:56:28.383932 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 13:56:28.384490 systemd-logind[1194]: Session 2 logged out. Waiting for processes to exit. Dec 13 13:56:28.385580 systemd[1]: Started sshd@2-10.0.0.19:22-10.0.0.1:56766.service. Dec 13 13:56:28.386359 systemd-logind[1194]: Removed session 2. Dec 13 13:56:28.417594 sshd[1289]: Accepted publickey for core from 10.0.0.1 port 56766 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:56:28.418657 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:56:28.421740 systemd-logind[1194]: New session 3 of user core. Dec 13 13:56:28.422510 systemd[1]: Started session-3.scope. Dec 13 13:56:28.471283 sshd[1289]: pam_unix(sshd:session): session closed for user core Dec 13 13:56:28.475359 systemd[1]: sshd@2-10.0.0.19:22-10.0.0.1:56766.service: Deactivated successfully. Dec 13 13:56:28.476160 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 13:56:28.476923 systemd-logind[1194]: Session 3 logged out. Waiting for processes to exit. Dec 13 13:56:28.477954 systemd-logind[1194]: Removed session 3. Dec 13 13:56:28.479626 systemd[1]: Started sshd@3-10.0.0.19:22-10.0.0.1:56778.service. Dec 13 13:56:28.514283 sshd[1295]: Accepted publickey for core from 10.0.0.1 port 56778 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:56:28.515352 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:56:28.518407 systemd-logind[1194]: New session 4 of user core. Dec 13 13:56:28.520691 systemd[1]: Started session-4.scope. Dec 13 13:56:28.573933 sshd[1295]: pam_unix(sshd:session): session closed for user core Dec 13 13:56:28.578118 systemd[1]: sshd@3-10.0.0.19:22-10.0.0.1:56778.service: Deactivated successfully. Dec 13 13:56:28.578944 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 13:56:28.579711 systemd-logind[1194]: Session 4 logged out. Waiting for processes to exit. Dec 13 13:56:28.581324 systemd[1]: Started sshd@4-10.0.0.19:22-10.0.0.1:56784.service. Dec 13 13:56:28.582465 systemd-logind[1194]: Removed session 4. Dec 13 13:56:28.614216 sshd[1301]: Accepted publickey for core from 10.0.0.1 port 56784 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:56:28.615375 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:56:28.618795 systemd-logind[1194]: New session 5 of user core. Dec 13 13:56:28.620730 systemd[1]: Started session-5.scope. Dec 13 13:56:28.677459 sudo[1304]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 13:56:28.677672 sudo[1304]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 13:56:28.695384 dbus-daemon[1184]: avc: received setenforce notice (enforcing=1) Dec 13 13:56:28.696276 sudo[1304]: pam_unix(sudo:session): session closed for user root Dec 13 13:56:28.698491 sshd[1301]: pam_unix(sshd:session): session closed for user core Dec 13 13:56:28.701867 systemd[1]: Started sshd@5-10.0.0.19:22-10.0.0.1:56794.service. Dec 13 13:56:28.702374 systemd[1]: sshd@4-10.0.0.19:22-10.0.0.1:56784.service: Deactivated successfully. Dec 13 13:56:28.703033 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 13:56:28.703567 systemd-logind[1194]: Session 5 logged out. Waiting for processes to exit. Dec 13 13:56:28.704299 systemd-logind[1194]: Removed session 5. Dec 13 13:56:28.735646 sshd[1307]: Accepted publickey for core from 10.0.0.1 port 56794 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:56:28.737264 sshd[1307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:56:28.743457 systemd-logind[1194]: New session 6 of user core. Dec 13 13:56:28.744267 systemd[1]: Started session-6.scope. Dec 13 13:56:28.795421 sudo[1312]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 13:56:28.795636 sudo[1312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 13:56:28.798289 sudo[1312]: pam_unix(sudo:session): session closed for user root Dec 13 13:56:28.802886 sudo[1311]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 13:56:28.803102 sudo[1311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 13:56:28.811637 systemd[1]: Stopping audit-rules.service... Dec 13 13:56:28.811000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 13:56:28.813061 auditctl[1315]: No rules Dec 13 13:56:28.813323 kernel: kauditd_printk_skb: 106 callbacks suppressed Dec 13 13:56:28.813354 kernel: audit: type=1305 audit(1734098188.811:196): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 13:56:28.813468 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 13:56:28.813622 systemd[1]: Stopped audit-rules.service. Dec 13 13:56:28.811000 audit[1315]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe37f9c50 a2=420 a3=0 items=0 ppid=1 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:28.815111 systemd[1]: Starting audit-rules.service... Dec 13 13:56:28.817160 kernel: audit: type=1300 audit(1734098188.811:196): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe37f9c50 a2=420 a3=0 items=0 ppid=1 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:28.817210 kernel: audit: type=1327 audit(1734098188.811:196): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 13:56:28.811000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 13:56:28.817942 kernel: audit: type=1131 audit(1734098188.812:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:28.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:28.831348 augenrules[1332]: No rules Dec 13 13:56:28.832063 systemd[1]: Finished audit-rules.service. Dec 13 13:56:28.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:28.834270 kernel: audit: type=1130 audit(1734098188.831:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:28.834405 sudo[1311]: pam_unix(sudo:session): session closed for user root Dec 13 13:56:28.833000 audit[1311]: USER_END pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:56:28.835954 sshd[1307]: pam_unix(sshd:session): session closed for user core Dec 13 13:56:28.833000 audit[1311]: CRED_DISP pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:56:28.839478 systemd[1]: Started sshd@6-10.0.0.19:22-10.0.0.1:56808.service. Dec 13 13:56:28.839797 kernel: audit: type=1106 audit(1734098188.833:199): pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:56:28.839837 kernel: audit: type=1104 audit(1734098188.833:200): pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:56:28.839866 kernel: audit: type=1106 audit(1734098188.833:201): pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:56:28.833000 audit[1307]: USER_END pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:56:28.839966 systemd[1]: sshd@5-10.0.0.19:22-10.0.0.1:56794.service: Deactivated successfully. Dec 13 13:56:28.840570 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 13:56:28.841117 systemd-logind[1194]: Session 6 logged out. Waiting for processes to exit. Dec 13 13:56:28.842055 systemd-logind[1194]: Removed session 6. Dec 13 13:56:28.842434 kernel: audit: type=1104 audit(1734098188.833:202): pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:56:28.833000 audit[1307]: CRED_DISP pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:56:28.844400 kernel: audit: type=1130 audit(1734098188.837:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.19:22-10.0.0.1:56808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:28.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.19:22-10.0.0.1:56808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:28.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.19:22-10.0.0.1:56794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:28.872686 sshd[1337]: Accepted publickey for core from 10.0.0.1 port 56808 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0 Dec 13 13:56:28.872000 audit[1337]: USER_ACCT pid=1337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:56:28.872000 audit[1337]: CRED_ACQ pid=1337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:56:28.872000 audit[1337]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd508e830 a2=3 a3=1 items=0 ppid=1 pid=1337 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:28.872000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 13:56:28.874041 sshd[1337]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 13:56:28.878063 systemd[1]: Started session-7.scope. Dec 13 13:56:28.878406 systemd-logind[1194]: New session 7 of user core. Dec 13 13:56:28.881000 audit[1337]: USER_START pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:56:28.882000 audit[1340]: CRED_ACQ pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:56:28.929000 audit[1341]: USER_ACCT pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:56:28.930188 sudo[1341]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 13:56:28.930000 audit[1341]: CRED_REFR pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:56:28.930702 sudo[1341]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 13:56:28.932000 audit[1341]: USER_START pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:56:28.942061 systemd[1]: Starting coreos-metadata.service... Dec 13 13:56:28.948559 systemd[1]: coreos-metadata.service: Deactivated successfully. Dec 13 13:56:28.948740 systemd[1]: Finished coreos-metadata.service. Dec 13 13:56:28.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:28.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:29.434690 systemd[1]: Stopped kubelet.service. Dec 13 13:56:29.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:29.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:29.436782 systemd[1]: Starting kubelet.service... Dec 13 13:56:29.451981 systemd[1]: Reloading. Dec 13 13:56:29.507320 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T13:56:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 13:56:29.507347 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T13:56:29Z" level=info msg="torcx already run" Dec 13 13:56:29.671982 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 13:56:29.672001 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 13:56:29.687628 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 13:56:29.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.736000 audit: BPF prog-id=40 op=LOAD Dec 13 13:56:29.736000 audit: BPF prog-id=38 op=UNLOAD Dec 13 13:56:29.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit: BPF prog-id=41 op=LOAD Dec 13 13:56:29.738000 audit: BPF prog-id=35 op=UNLOAD Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit: BPF prog-id=42 op=LOAD Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.738000 audit: BPF prog-id=43 op=LOAD Dec 13 13:56:29.738000 audit: BPF prog-id=36 op=UNLOAD Dec 13 13:56:29.738000 audit: BPF prog-id=37 op=UNLOAD Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit: BPF prog-id=44 op=LOAD Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit: BPF prog-id=45 op=LOAD Dec 13 13:56:29.739000 audit: BPF prog-id=24 op=UNLOAD Dec 13 13:56:29.739000 audit: BPF prog-id=25 op=UNLOAD Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.740000 audit: BPF prog-id=46 op=LOAD Dec 13 13:56:29.740000 audit: BPF prog-id=33 op=UNLOAD Dec 13 13:56:29.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.740000 audit: BPF prog-id=47 op=LOAD Dec 13 13:56:29.740000 audit: BPF prog-id=26 op=UNLOAD Dec 13 13:56:29.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.741000 audit: BPF prog-id=48 op=LOAD Dec 13 13:56:29.741000 audit: BPF prog-id=34 op=UNLOAD Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit: BPF prog-id=49 op=LOAD Dec 13 13:56:29.742000 audit: BPF prog-id=27 op=UNLOAD Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit: BPF prog-id=50 op=LOAD Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.742000 audit: BPF prog-id=51 op=LOAD Dec 13 13:56:29.742000 audit: BPF prog-id=28 op=UNLOAD Dec 13 13:56:29.742000 audit: BPF prog-id=29 op=UNLOAD Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit: BPF prog-id=52 op=LOAD Dec 13 13:56:29.743000 audit: BPF prog-id=30 op=UNLOAD Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit: BPF prog-id=53 op=LOAD Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:29.743000 audit: BPF prog-id=54 op=LOAD Dec 13 13:56:29.743000 audit: BPF prog-id=31 op=UNLOAD Dec 13 13:56:29.743000 audit: BPF prog-id=32 op=UNLOAD Dec 13 13:56:29.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:29.760710 systemd[1]: Started kubelet.service. Dec 13 13:56:29.762532 systemd[1]: Stopping kubelet.service... Dec 13 13:56:29.762877 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 13:56:29.763061 systemd[1]: Stopped kubelet.service. Dec 13 13:56:29.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:29.764502 systemd[1]: Starting kubelet.service... Dec 13 13:56:29.845580 systemd[1]: Started kubelet.service. Dec 13 13:56:29.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:29.884016 kubelet[1452]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 13:56:29.884016 kubelet[1452]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 13:56:29.884016 kubelet[1452]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 13:56:29.885793 kubelet[1452]: I1213 13:56:29.885734 1452 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 13:56:30.555610 kubelet[1452]: I1213 13:56:30.555577 1452 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 13:56:30.555741 kubelet[1452]: I1213 13:56:30.555731 1452 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 13:56:30.555979 kubelet[1452]: I1213 13:56:30.555963 1452 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 13:56:30.591202 kubelet[1452]: I1213 13:56:30.591157 1452 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 13:56:30.600416 kubelet[1452]: I1213 13:56:30.600393 1452 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 13:56:30.600768 kubelet[1452]: I1213 13:56:30.600748 1452 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 13:56:30.600932 kubelet[1452]: I1213 13:56:30.600770 1452 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.19","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 13:56:30.601024 kubelet[1452]: I1213 13:56:30.600995 1452 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 13:56:30.601024 kubelet[1452]: I1213 13:56:30.601004 1452 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 13:56:30.601276 kubelet[1452]: I1213 13:56:30.601262 1452 state_mem.go:36] "Initialized new in-memory state store" Dec 13 13:56:30.603967 kubelet[1452]: I1213 13:56:30.603942 1452 kubelet.go:400] "Attempting to sync node with API server" Dec 13 13:56:30.604004 kubelet[1452]: I1213 13:56:30.603971 1452 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 13:56:30.604097 kubelet[1452]: I1213 13:56:30.604081 1452 kubelet.go:312] "Adding apiserver pod source" Dec 13 13:56:30.604210 kubelet[1452]: I1213 13:56:30.604195 1452 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 13:56:30.604466 kubelet[1452]: E1213 13:56:30.604387 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:30.604466 kubelet[1452]: E1213 13:56:30.604427 1452 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:30.605351 kubelet[1452]: I1213 13:56:30.605330 1452 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 13:56:30.605685 kubelet[1452]: I1213 13:56:30.605658 1452 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 13:56:30.605770 kubelet[1452]: W1213 13:56:30.605758 1452 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 13:56:30.606550 kubelet[1452]: I1213 13:56:30.606530 1452 server.go:1264] "Started kubelet" Dec 13 13:56:30.607150 kubelet[1452]: I1213 13:56:30.607112 1452 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 13:56:30.607230 kubelet[1452]: I1213 13:56:30.607177 1452 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 13:56:30.607507 kubelet[1452]: I1213 13:56:30.607488 1452 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 13:56:30.607000 audit[1452]: AVC avc: denied { mac_admin } for pid=1452 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:30.607000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 13:56:30.607000 audit[1452]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008fb110 a1=4000a18c48 a2=40008fb0e0 a3=25 items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:30.607000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 13:56:30.607000 audit[1452]: AVC avc: denied { mac_admin } for pid=1452 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:30.607000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 13:56:30.607000 audit[1452]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008f4e20 a1=4000a18c60 a2=40008fb1a0 a3=25 items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:30.607000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 13:56:30.607943 kubelet[1452]: I1213 13:56:30.607691 1452 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 13:56:30.607943 kubelet[1452]: I1213 13:56:30.607726 1452 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 13:56:30.607943 kubelet[1452]: I1213 13:56:30.607779 1452 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 13:56:30.609371 kubelet[1452]: I1213 13:56:30.609354 1452 server.go:455] "Adding debug handlers to kubelet server" Dec 13 13:56:30.611035 kubelet[1452]: E1213 13:56:30.610996 1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found" Dec 13 13:56:30.611354 kubelet[1452]: I1213 13:56:30.611333 1452 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 13:56:30.611700 kubelet[1452]: I1213 13:56:30.611673 1452 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 13:56:30.613931 kubelet[1452]: I1213 13:56:30.613909 1452 factory.go:221] Registration of the systemd container factory successfully Dec 13 13:56:30.614168 kubelet[1452]: I1213 13:56:30.614141 1452 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 13:56:30.614768 kubelet[1452]: E1213 13:56:30.614730 1452 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.19\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Dec 13 13:56:30.615041 kubelet[1452]: W1213 13:56:30.615002 1452 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 13:56:30.615041 kubelet[1452]: E1213 13:56:30.615038 1452 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Dec 13 13:56:30.617069 kubelet[1452]: I1213 13:56:30.617046 1452 reconciler.go:26] "Reconciler: start to sync state" Dec 13 13:56:30.617409 kubelet[1452]: E1213 13:56:30.617377 1452 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 13:56:30.618937 kubelet[1452]: I1213 13:56:30.618766 1452 factory.go:221] Registration of the containerd container factory successfully Dec 13 13:56:30.623821 kubelet[1452]: W1213 13:56:30.623774 1452 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 13:56:30.623821 kubelet[1452]: E1213 13:56:30.623818 1452 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Dec 13 13:56:30.623908 kubelet[1452]: W1213 13:56:30.623846 1452 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.19" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 13:56:30.623908 kubelet[1452]: E1213 13:56:30.623856 1452 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.19" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Dec 13 13:56:30.631263 kubelet[1452]: E1213 13:56:30.631012 1452 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.19.1810c11de0bf8ddd default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.19,UID:10.0.0.19,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.0.0.19,},FirstTimestamp:2024-12-13 13:56:30.606503389 +0000 UTC m=+0.757889635,LastTimestamp:2024-12-13 13:56:30.606503389 +0000 UTC m=+0.757889635,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.19,}" Dec 13 13:56:30.631964 kubelet[1452]: I1213 13:56:30.631943 1452 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 13:56:30.631964 kubelet[1452]: I1213 13:56:30.631959 1452 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 13:56:30.632048 kubelet[1452]: I1213 13:56:30.631977 1452 state_mem.go:36] "Initialized new in-memory state store" Dec 13 13:56:30.698211 kubelet[1452]: I1213 13:56:30.698180 1452 policy_none.go:49] "None policy: Start" Dec 13 13:56:30.699319 kubelet[1452]: I1213 13:56:30.699303 1452 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 13:56:30.699383 kubelet[1452]: I1213 13:56:30.699331 1452 state_mem.go:35] "Initializing new in-memory state store" Dec 13 13:56:30.705484 systemd[1]: Created slice kubepods.slice. Dec 13 13:56:30.707000 audit[1467]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:30.707000 audit[1467]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe7811c30 a2=0 a3=1 items=0 ppid=1452 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:30.707000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 13:56:30.708000 audit[1470]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:30.708000 audit[1470]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffc43536c0 a2=0 a3=1 items=0 ppid=1452 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:30.708000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 13:56:30.710343 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 13:56:30.713712 kubelet[1452]: I1213 13:56:30.713674 1452 kubelet_node_status.go:73] "Attempting to register node" node="10.0.0.19" Dec 13 13:56:30.717065 kubelet[1452]: I1213 13:56:30.717029 1452 kubelet_node_status.go:76] "Successfully registered node" node="10.0.0.19" Dec 13 13:56:30.723548 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 13:56:30.724747 kubelet[1452]: I1213 13:56:30.724724 1452 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 13:56:30.723000 audit[1452]: AVC avc: denied { mac_admin } for pid=1452 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:30.723000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 13:56:30.723000 audit[1452]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d2edb0 a1=4000b7d6f8 a2=4000d2ed80 a3=25 items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:30.723000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 13:56:30.725011 kubelet[1452]: I1213 13:56:30.724783 1452 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 13:56:30.725011 kubelet[1452]: I1213 13:56:30.724894 1452 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 13:56:30.725011 kubelet[1452]: I1213 13:56:30.725002 1452 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 13:56:30.726484 kubelet[1452]: E1213 13:56:30.726452 1452 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.19\" not found" Dec 13 13:56:30.726663 kubelet[1452]: E1213 13:56:30.726632 1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found" Dec 13 13:56:30.713000 audit[1472]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:30.713000 audit[1472]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff676ff80 a2=0 a3=1 items=0 ppid=1452 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:30.713000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 13:56:30.734000 audit[1478]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:30.734000 audit[1478]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffcbb35350 a2=0 a3=1 items=0 ppid=1452 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:30.734000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 13:56:30.768000 audit[1483]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:30.768000 audit[1483]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff784aa30 a2=0 a3=1 items=0 ppid=1452 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:30.768000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 13:56:30.769047 kubelet[1452]: I1213 13:56:30.769008 1452 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 13:56:30.769000 audit[1485]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:30.769000 audit[1485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd17b72b0 a2=0 a3=1 items=0 ppid=1452 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:30.769000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 13:56:30.769000 audit[1484]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:30.769000 audit[1484]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffce2a0990 a2=0 a3=1 items=0 ppid=1452 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:30.769000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 13:56:30.770277 kubelet[1452]: I1213 13:56:30.770252 1452 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 13:56:30.770363 kubelet[1452]: I1213 13:56:30.770349 1452 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 13:56:30.770392 kubelet[1452]: I1213 13:56:30.770373 1452 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 13:56:30.770430 kubelet[1452]: E1213 13:56:30.770418 1452 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 13:56:30.771000 audit[1486]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:30.771000 audit[1487]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:30.771000 audit[1487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc05486c0 a2=0 a3=1 items=0 ppid=1452 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:30.771000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 13:56:30.771000 audit[1486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffec8ccf80 a2=0 a3=1 items=0 ppid=1452 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:30.771000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 13:56:30.772000 audit[1488]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:30.772000 audit[1488]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe4bd9240 a2=0 a3=1 items=0 ppid=1452 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:30.772000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 13:56:30.772000 audit[1489]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:30.772000 audit[1489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc7be98e0 a2=0 a3=1 items=0 ppid=1452 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:30.772000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 13:56:30.773000 audit[1490]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:30.773000 audit[1490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc3539e50 a2=0 a3=1 items=0 ppid=1452 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:30.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 13:56:30.827614 kubelet[1452]: E1213 13:56:30.827517 1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found" Dec 13 13:56:30.866041 sudo[1341]: pam_unix(sudo:session): session closed for user root Dec 13 13:56:30.865000 audit[1341]: USER_END pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:56:30.865000 audit[1341]: CRED_DISP pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 13:56:30.867410 sshd[1337]: pam_unix(sshd:session): session closed for user core Dec 13 13:56:30.867000 audit[1337]: USER_END pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:56:30.868000 audit[1337]: CRED_DISP pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 13:56:30.869693 systemd[1]: sshd@6-10.0.0.19:22-10.0.0.1:56808.service: Deactivated successfully. Dec 13 13:56:30.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.19:22-10.0.0.1:56808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 13:56:30.870380 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 13:56:30.870887 systemd-logind[1194]: Session 7 logged out. Waiting for processes to exit. Dec 13 13:56:30.871546 systemd-logind[1194]: Removed session 7. Dec 13 13:56:30.928289 kubelet[1452]: E1213 13:56:30.928211 1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found" Dec 13 13:56:31.028691 kubelet[1452]: E1213 13:56:31.028666 1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found" Dec 13 13:56:31.129354 kubelet[1452]: E1213 13:56:31.129258 1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found" Dec 13 13:56:31.229703 kubelet[1452]: E1213 13:56:31.229677 1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found" Dec 13 13:56:31.330174 kubelet[1452]: E1213 13:56:31.330151 1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found" Dec 13 13:56:31.430843 kubelet[1452]: E1213 13:56:31.430759 1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found" Dec 13 13:56:31.531279 kubelet[1452]: E1213 13:56:31.531244 1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found" Dec 13 13:56:31.558410 kubelet[1452]: I1213 13:56:31.558390 1452 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Dec 13 13:56:31.558920 kubelet[1452]: W1213 13:56:31.558889 1452 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Dec 13 13:56:31.604698 kubelet[1452]: E1213 13:56:31.604655 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:31.631661 kubelet[1452]: E1213 13:56:31.631626 1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found" Dec 13 13:56:31.732393 kubelet[1452]: E1213 13:56:31.732284 1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found" Dec 13 13:56:31.833718 kubelet[1452]: I1213 13:56:31.833691 1452 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Dec 13 13:56:31.834260 env[1206]: time="2024-12-13T13:56:31.834182971Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 13:56:31.834755 kubelet[1452]: I1213 13:56:31.834735 1452 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Dec 13 13:56:32.605295 kubelet[1452]: E1213 13:56:32.605225 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:32.605295 kubelet[1452]: I1213 13:56:32.605244 1452 apiserver.go:52] "Watching apiserver" Dec 13 13:56:32.609719 kubelet[1452]: I1213 13:56:32.609678 1452 topology_manager.go:215] "Topology Admit Handler" podUID="7f517b72-957a-469d-bb88-9394e18cc20a" podNamespace="calico-system" podName="calico-node-wqwlk" Dec 13 13:56:32.609939 kubelet[1452]: I1213 13:56:32.609920 1452 topology_manager.go:215] "Topology Admit Handler" podUID="8da14905-625a-4f83-a34c-8ea13d6ed11a" podNamespace="calico-system" podName="csi-node-driver-6tkwm" Dec 13 13:56:32.610124 kubelet[1452]: I1213 13:56:32.610106 1452 topology_manager.go:215] "Topology Admit Handler" podUID="f7de8412-fa03-4dfe-8082-45475c0d1113" podNamespace="kube-system" podName="kube-proxy-7jw9p" Dec 13 13:56:32.610430 kubelet[1452]: E1213 13:56:32.610271 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6tkwm" podUID="8da14905-625a-4f83-a34c-8ea13d6ed11a" Dec 13 13:56:32.614858 systemd[1]: Created slice kubepods-besteffort-pod7f517b72_957a_469d_bb88_9394e18cc20a.slice. Dec 13 13:56:32.615418 kubelet[1452]: I1213 13:56:32.615211 1452 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 13:56:32.625399 systemd[1]: Created slice kubepods-besteffort-podf7de8412_fa03_4dfe_8082_45475c0d1113.slice. Dec 13 13:56:32.627058 kubelet[1452]: I1213 13:56:32.627019 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6tkxr\" (UniqueName: \"kubernetes.io/projected/f7de8412-fa03-4dfe-8082-45475c0d1113-kube-api-access-6tkxr\") pod \"kube-proxy-7jw9p\" (UID: \"f7de8412-fa03-4dfe-8082-45475c0d1113\") " pod="kube-system/kube-proxy-7jw9p" Dec 13 13:56:32.627125 kubelet[1452]: I1213 13:56:32.627059 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7f517b72-957a-469d-bb88-9394e18cc20a-lib-modules\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk" Dec 13 13:56:32.627125 kubelet[1452]: I1213 13:56:32.627079 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7f517b72-957a-469d-bb88-9394e18cc20a-xtables-lock\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk" Dec 13 13:56:32.627125 kubelet[1452]: I1213 13:56:32.627094 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/7f517b72-957a-469d-bb88-9394e18cc20a-node-certs\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk" Dec 13 13:56:32.627125 kubelet[1452]: I1213 13:56:32.627115 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7f517b72-957a-469d-bb88-9394e18cc20a-var-lib-calico\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk" Dec 13 13:56:32.627224 kubelet[1452]: I1213 13:56:32.627131 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/7f517b72-957a-469d-bb88-9394e18cc20a-cni-log-dir\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk" Dec 13 13:56:32.627224 kubelet[1452]: I1213 13:56:32.627169 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jvmgc\" (UniqueName: \"kubernetes.io/projected/7f517b72-957a-469d-bb88-9394e18cc20a-kube-api-access-jvmgc\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk" Dec 13 13:56:32.627224 kubelet[1452]: I1213 13:56:32.627186 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/8da14905-625a-4f83-a34c-8ea13d6ed11a-socket-dir\") pod \"csi-node-driver-6tkwm\" (UID: \"8da14905-625a-4f83-a34c-8ea13d6ed11a\") " pod="calico-system/csi-node-driver-6tkwm" Dec 13 13:56:32.627224 kubelet[1452]: I1213 13:56:32.627203 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f7de8412-fa03-4dfe-8082-45475c0d1113-lib-modules\") pod \"kube-proxy-7jw9p\" (UID: \"f7de8412-fa03-4dfe-8082-45475c0d1113\") " pod="kube-system/kube-proxy-7jw9p" Dec 13 13:56:32.627224 kubelet[1452]: I1213 13:56:32.627218 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/7f517b72-957a-469d-bb88-9394e18cc20a-var-run-calico\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk" Dec 13 13:56:32.627360 kubelet[1452]: I1213 13:56:32.627260 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/7f517b72-957a-469d-bb88-9394e18cc20a-cni-bin-dir\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk" Dec 13 13:56:32.627360 kubelet[1452]: I1213 13:56:32.627277 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/7f517b72-957a-469d-bb88-9394e18cc20a-flexvol-driver-host\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk" Dec 13 13:56:32.627360 kubelet[1452]: I1213 13:56:32.627294 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/8da14905-625a-4f83-a34c-8ea13d6ed11a-registration-dir\") pod \"csi-node-driver-6tkwm\" (UID: \"8da14905-625a-4f83-a34c-8ea13d6ed11a\") " pod="calico-system/csi-node-driver-6tkwm" Dec 13 13:56:32.627360 kubelet[1452]: I1213 13:56:32.627310 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7f517b72-957a-469d-bb88-9394e18cc20a-tigera-ca-bundle\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk" Dec 13 13:56:32.627360 kubelet[1452]: I1213 13:56:32.627324 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f7de8412-fa03-4dfe-8082-45475c0d1113-xtables-lock\") pod \"kube-proxy-7jw9p\" (UID: \"f7de8412-fa03-4dfe-8082-45475c0d1113\") " pod="kube-system/kube-proxy-7jw9p" Dec 13 13:56:32.627469 kubelet[1452]: I1213 13:56:32.627340 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/8da14905-625a-4f83-a34c-8ea13d6ed11a-kubelet-dir\") pod \"csi-node-driver-6tkwm\" (UID: \"8da14905-625a-4f83-a34c-8ea13d6ed11a\") " pod="calico-system/csi-node-driver-6tkwm" Dec 13 13:56:32.627469 kubelet[1452]: I1213 13:56:32.627403 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ttwdj\" (UniqueName: \"kubernetes.io/projected/8da14905-625a-4f83-a34c-8ea13d6ed11a-kube-api-access-ttwdj\") pod \"csi-node-driver-6tkwm\" (UID: \"8da14905-625a-4f83-a34c-8ea13d6ed11a\") " pod="calico-system/csi-node-driver-6tkwm" Dec 13 13:56:32.627469 kubelet[1452]: I1213 13:56:32.627421 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/f7de8412-fa03-4dfe-8082-45475c0d1113-kube-proxy\") pod \"kube-proxy-7jw9p\" (UID: \"f7de8412-fa03-4dfe-8082-45475c0d1113\") " pod="kube-system/kube-proxy-7jw9p" Dec 13 13:56:32.627540 kubelet[1452]: I1213 13:56:32.627457 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/7f517b72-957a-469d-bb88-9394e18cc20a-policysync\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk" Dec 13 13:56:32.627540 kubelet[1452]: I1213 13:56:32.627495 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/7f517b72-957a-469d-bb88-9394e18cc20a-cni-net-dir\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk" Dec 13 13:56:32.627540 kubelet[1452]: I1213 13:56:32.627511 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/8da14905-625a-4f83-a34c-8ea13d6ed11a-varrun\") pod \"csi-node-driver-6tkwm\" (UID: \"8da14905-625a-4f83-a34c-8ea13d6ed11a\") " pod="calico-system/csi-node-driver-6tkwm" Dec 13 13:56:32.730048 kubelet[1452]: E1213 13:56:32.730020 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:32.730178 kubelet[1452]: W1213 13:56:32.730163 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:32.730274 kubelet[1452]: E1213 13:56:32.730259 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:32.733140 kubelet[1452]: E1213 13:56:32.733119 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:32.733283 kubelet[1452]: W1213 13:56:32.733264 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:32.733351 kubelet[1452]: E1213 13:56:32.733339 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:32.742488 kubelet[1452]: E1213 13:56:32.742470 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:32.742594 kubelet[1452]: W1213 13:56:32.742579 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:32.742657 kubelet[1452]: E1213 13:56:32.742646 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:32.745273 kubelet[1452]: E1213 13:56:32.745256 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:32.745379 kubelet[1452]: W1213 13:56:32.745364 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:32.745433 kubelet[1452]: E1213 13:56:32.745424 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:32.747441 kubelet[1452]: E1213 13:56:32.747414 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:32.747441 kubelet[1452]: W1213 13:56:32.747435 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:32.747606 kubelet[1452]: E1213 13:56:32.747448 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:32.924481 kubelet[1452]: E1213 13:56:32.924368 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:56:32.925321 env[1206]: time="2024-12-13T13:56:32.925157997Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wqwlk,Uid:7f517b72-957a-469d-bb88-9394e18cc20a,Namespace:calico-system,Attempt:0,}" Dec 13 13:56:32.928029 kubelet[1452]: E1213 13:56:32.928004 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:56:32.928615 env[1206]: time="2024-12-13T13:56:32.928578141Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7jw9p,Uid:f7de8412-fa03-4dfe-8082-45475c0d1113,Namespace:kube-system,Attempt:0,}" Dec 13 13:56:33.483424 env[1206]: time="2024-12-13T13:56:33.483373331Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:33.485327 env[1206]: time="2024-12-13T13:56:33.485290185Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:33.486657 env[1206]: time="2024-12-13T13:56:33.486629010Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:33.488458 env[1206]: time="2024-12-13T13:56:33.488420541Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:33.489708 env[1206]: time="2024-12-13T13:56:33.489676597Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:33.492264 env[1206]: time="2024-12-13T13:56:33.492214513Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:33.494007 env[1206]: time="2024-12-13T13:56:33.493972182Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:33.498481 env[1206]: time="2024-12-13T13:56:33.498422744Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:33.530946 env[1206]: time="2024-12-13T13:56:33.530858619Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:56:33.531089 env[1206]: time="2024-12-13T13:56:33.530928128Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:56:33.531089 env[1206]: time="2024-12-13T13:56:33.530965563Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:56:33.531089 env[1206]: time="2024-12-13T13:56:33.530975725Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:56:33.531089 env[1206]: time="2024-12-13T13:56:33.530955321Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:56:33.531089 env[1206]: time="2024-12-13T13:56:33.531029515Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:56:33.531312 env[1206]: time="2024-12-13T13:56:33.531200173Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f21c58afdc2aa3a6e3d31d55f60385536577a9e5d3f9966538c9edd51cfae2f5 pid=1519 runtime=io.containerd.runc.v2 Dec 13 13:56:33.531393 env[1206]: time="2024-12-13T13:56:33.531342288Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e337b86b33c0483134753996a4427b868006567cde72646b060a78e82664476f pid=1520 runtime=io.containerd.runc.v2 Dec 13 13:56:33.551685 systemd[1]: Started cri-containerd-f21c58afdc2aa3a6e3d31d55f60385536577a9e5d3f9966538c9edd51cfae2f5.scope. Dec 13 13:56:33.554962 systemd[1]: Started cri-containerd-e337b86b33c0483134753996a4427b868006567cde72646b060a78e82664476f.scope. Dec 13 13:56:33.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.579000 audit: BPF prog-id=55 op=LOAD Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1519 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:33.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316335386166646332616133613665336433316435356636303338 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1519 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:33.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316335386166646332616133613665336433316435356636303338 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit: BPF prog-id=56 op=LOAD Dec 13 13:56:33.580000 audit[1537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1519 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:33.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316335386166646332616133613665336433316435356636303338 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit: BPF prog-id=57 op=LOAD Dec 13 13:56:33.580000 audit[1537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1519 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:33.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316335386166646332616133613665336433316435356636303338 Dec 13 13:56:33.580000 audit: BPF prog-id=57 op=UNLOAD Dec 13 13:56:33.580000 audit: BPF prog-id=56 op=UNLOAD Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.580000 audit: BPF prog-id=58 op=LOAD Dec 13 13:56:33.580000 audit[1537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1519 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:33.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316335386166646332616133613665336433316435356636303338 Dec 13 13:56:33.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.581000 audit: BPF prog-id=59 op=LOAD Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1520 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:33.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533333762383662333363303438333133343735333939366134343237 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1520 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:33.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533333762383662333363303438333133343735333939366134343237 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit: BPF prog-id=60 op=LOAD Dec 13 13:56:33.582000 audit[1539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1520 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:33.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533333762383662333363303438333133343735333939366134343237 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit: BPF prog-id=61 op=LOAD Dec 13 13:56:33.582000 audit[1539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1520 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:33.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533333762383662333363303438333133343735333939366134343237 Dec 13 13:56:33.582000 audit: BPF prog-id=61 op=UNLOAD Dec 13 13:56:33.582000 audit: BPF prog-id=60 op=UNLOAD Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { perfmon } for pid=1539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit[1539]: AVC avc: denied { bpf } for pid=1539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:33.582000 audit: BPF prog-id=62 op=LOAD Dec 13 13:56:33.582000 audit[1539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1520 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:33.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533333762383662333363303438333133343735333939366134343237 Dec 13 13:56:33.597797 env[1206]: time="2024-12-13T13:56:33.596746217Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7jw9p,Uid:f7de8412-fa03-4dfe-8082-45475c0d1113,Namespace:kube-system,Attempt:0,} returns sandbox id \"f21c58afdc2aa3a6e3d31d55f60385536577a9e5d3f9966538c9edd51cfae2f5\"" Dec 13 13:56:33.597909 kubelet[1452]: E1213 13:56:33.597673 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:56:33.599088 env[1206]: time="2024-12-13T13:56:33.598867551Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 13:56:33.599382 env[1206]: time="2024-12-13T13:56:33.599350387Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wqwlk,Uid:7f517b72-957a-469d-bb88-9394e18cc20a,Namespace:calico-system,Attempt:0,} returns sandbox id \"e337b86b33c0483134753996a4427b868006567cde72646b060a78e82664476f\"" Dec 13 13:56:33.599849 kubelet[1452]: E1213 13:56:33.599828 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:56:33.606060 kubelet[1452]: E1213 13:56:33.606028 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:33.738438 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount612244237.mount: Deactivated successfully. Dec 13 13:56:33.770929 kubelet[1452]: E1213 13:56:33.770851 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6tkwm" podUID="8da14905-625a-4f83-a34c-8ea13d6ed11a" Dec 13 13:56:34.606424 kubelet[1452]: E1213 13:56:34.606367 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:34.640205 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2816558228.mount: Deactivated successfully. Dec 13 13:56:35.060520 env[1206]: time="2024-12-13T13:56:35.060421893Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:35.061895 env[1206]: time="2024-12-13T13:56:35.061866350Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4612aebc0675831aedbbde7cd56b85db91f1fdcf05ef923072961538ec497adb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:35.064643 env[1206]: time="2024-12-13T13:56:35.064606293Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:35.065773 env[1206]: time="2024-12-13T13:56:35.065751575Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:35.066114 env[1206]: time="2024-12-13T13:56:35.066089047Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:4612aebc0675831aedbbde7cd56b85db91f1fdcf05ef923072961538ec497adb\"" Dec 13 13:56:35.067924 env[1206]: time="2024-12-13T13:56:35.067896069Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 13:56:35.068970 env[1206]: time="2024-12-13T13:56:35.068937119Z" level=info msg="CreateContainer within sandbox \"f21c58afdc2aa3a6e3d31d55f60385536577a9e5d3f9966538c9edd51cfae2f5\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 13:56:35.080431 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount552174314.mount: Deactivated successfully. Dec 13 13:56:35.083709 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount685565257.mount: Deactivated successfully. Dec 13 13:56:35.089743 env[1206]: time="2024-12-13T13:56:35.089698692Z" level=info msg="CreateContainer within sandbox \"f21c58afdc2aa3a6e3d31d55f60385536577a9e5d3f9966538c9edd51cfae2f5\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9faa1a65e83c419eb3eb37937e46de92510e066e536b1b0cb35d2acbf9322fed\"" Dec 13 13:56:35.090491 env[1206]: time="2024-12-13T13:56:35.090462041Z" level=info msg="StartContainer for \"9faa1a65e83c419eb3eb37937e46de92510e066e536b1b0cb35d2acbf9322fed\"" Dec 13 13:56:35.108003 systemd[1]: Started cri-containerd-9faa1a65e83c419eb3eb37937e46de92510e066e536b1b0cb35d2acbf9322fed.scope. Dec 13 13:56:35.129000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.131528 kernel: kauditd_printk_skb: 357 callbacks suppressed Dec 13 13:56:35.131603 kernel: audit: type=1400 audit(1734098195.129:448): avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.129000 audit[1596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1519 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.136197 kernel: audit: type=1300 audit(1734098195.129:448): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1519 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.136272 kernel: audit: type=1327 audit(1734098195.129:448): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966616131613635653833633431396562336562333739333765343664 Dec 13 13:56:35.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966616131613635653833633431396562336562333739333765343664 Dec 13 13:56:35.129000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.140485 kernel: audit: type=1400 audit(1734098195.129:449): avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.140542 kernel: audit: type=1400 audit(1734098195.129:449): avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.129000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.142224 kernel: audit: type=1400 audit(1734098195.129:449): avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.129000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.129000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.145781 kernel: audit: type=1400 audit(1734098195.129:449): avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.129000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.148020 kernel: audit: type=1400 audit(1734098195.129:449): avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.148079 kernel: audit: type=1400 audit(1734098195.129:449): avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.129000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.149622 kernel: audit: type=1400 audit(1734098195.129:449): avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.129000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.129000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.129000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.129000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.129000 audit: BPF prog-id=63 op=LOAD Dec 13 13:56:35.129000 audit[1596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1519 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966616131613635653833633431396562336562333739333765343664 Dec 13 13:56:35.130000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.130000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.130000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.130000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.130000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.130000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.130000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.130000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.130000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.130000 audit: BPF prog-id=64 op=LOAD Dec 13 13:56:35.130000 audit[1596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1519 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966616131613635653833633431396562336562333739333765343664 Dec 13 13:56:35.132000 audit: BPF prog-id=64 op=UNLOAD Dec 13 13:56:35.132000 audit: BPF prog-id=63 op=UNLOAD Dec 13 13:56:35.132000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.132000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.132000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.132000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.132000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.132000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.132000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.132000 audit[1596]: AVC avc: denied { perfmon } for pid=1596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.132000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.132000 audit[1596]: AVC avc: denied { bpf } for pid=1596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:35.132000 audit: BPF prog-id=65 op=LOAD Dec 13 13:56:35.132000 audit[1596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1519 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966616131613635653833633431396562336562333739333765343664 Dec 13 13:56:35.158541 env[1206]: time="2024-12-13T13:56:35.158497070Z" level=info msg="StartContainer for \"9faa1a65e83c419eb3eb37937e46de92510e066e536b1b0cb35d2acbf9322fed\" returns successfully" Dec 13 13:56:35.272000 audit[1648]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.272000 audit[1648]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcbb9d9b0 a2=0 a3=1 items=0 ppid=1607 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.272000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 13:56:35.272000 audit[1649]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1649 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.272000 audit[1649]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcb41bf90 a2=0 a3=1 items=0 ppid=1607 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.272000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 13:56:35.273000 audit[1650]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1650 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.273000 audit[1650]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdfa601a0 a2=0 a3=1 items=0 ppid=1607 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 13:56:35.274000 audit[1651]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1651 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.274000 audit[1651]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff60edc0 a2=0 a3=1 items=0 ppid=1607 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.274000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 13:56:35.275000 audit[1653]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1653 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.275000 audit[1653]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc2d59a80 a2=0 a3=1 items=0 ppid=1607 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.275000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 13:56:35.276000 audit[1652]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1652 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.276000 audit[1652]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffecbd3560 a2=0 a3=1 items=0 ppid=1607 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.276000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 13:56:35.374000 audit[1654]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1654 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.374000 audit[1654]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff0c16600 a2=0 a3=1 items=0 ppid=1607 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.374000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 13:56:35.381000 audit[1656]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1656 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.381000 audit[1656]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff4df20b0 a2=0 a3=1 items=0 ppid=1607 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.381000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 13:56:35.384000 audit[1659]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1659 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.384000 audit[1659]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff6073b00 a2=0 a3=1 items=0 ppid=1607 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.384000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 13:56:35.385000 audit[1660]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1660 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.385000 audit[1660]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4fa1440 a2=0 a3=1 items=0 ppid=1607 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 13:56:35.387000 audit[1662]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1662 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.387000 audit[1662]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe7102930 a2=0 a3=1 items=0 ppid=1607 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.387000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 13:56:35.388000 audit[1663]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1663 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.388000 audit[1663]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc01ba9c0 a2=0 a3=1 items=0 ppid=1607 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.388000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 13:56:35.391000 audit[1665]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1665 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.391000 audit[1665]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffda2e5370 a2=0 a3=1 items=0 ppid=1607 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.391000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 13:56:35.395000 audit[1668]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1668 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.395000 audit[1668]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffda56f280 a2=0 a3=1 items=0 ppid=1607 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.395000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 13:56:35.402000 audit[1669]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1669 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.402000 audit[1669]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc8b4f530 a2=0 a3=1 items=0 ppid=1607 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.402000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 13:56:35.404000 audit[1671]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1671 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.404000 audit[1671]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc19d1b90 a2=0 a3=1 items=0 ppid=1607 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.404000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 13:56:35.406000 audit[1672]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1672 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.406000 audit[1672]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc13a1330 a2=0 a3=1 items=0 ppid=1607 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.406000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 13:56:35.408000 audit[1674]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1674 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.408000 audit[1674]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc36101e0 a2=0 a3=1 items=0 ppid=1607 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.408000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 13:56:35.411000 audit[1677]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1677 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.411000 audit[1677]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff0b63cc0 a2=0 a3=1 items=0 ppid=1607 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 13:56:35.414000 audit[1680]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.414000 audit[1680]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc05c22f0 a2=0 a3=1 items=0 ppid=1607 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.414000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 13:56:35.416000 audit[1681]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.416000 audit[1681]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd9348400 a2=0 a3=1 items=0 ppid=1607 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.416000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 13:56:35.418000 audit[1683]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.418000 audit[1683]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffe413c50 a2=0 a3=1 items=0 ppid=1607 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 13:56:35.458000 audit[1688]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.458000 audit[1688]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc2e3e740 a2=0 a3=1 items=0 ppid=1607 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.458000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 13:56:35.459000 audit[1689]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.459000 audit[1689]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc6313290 a2=0 a3=1 items=0 ppid=1607 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 13:56:35.462000 audit[1691]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 13:56:35.462000 audit[1691]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd48fa070 a2=0 a3=1 items=0 ppid=1607 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.462000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 13:56:35.486000 audit[1697]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:56:35.486000 audit[1697]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd99093b0 a2=0 a3=1 items=0 ppid=1607 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.486000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:56:35.517000 audit[1697]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:56:35.517000 audit[1697]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9084 a0=3 a1=ffffd99093b0 a2=0 a3=1 items=0 ppid=1607 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.517000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:56:35.518000 audit[1703]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.518000 audit[1703]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd8cb1bc0 a2=0 a3=1 items=0 ppid=1607 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.518000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 13:56:35.521000 audit[1705]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.521000 audit[1705]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdec54870 a2=0 a3=1 items=0 ppid=1607 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 13:56:35.524000 audit[1708]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.524000 audit[1708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd9c1f7f0 a2=0 a3=1 items=0 ppid=1607 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 13:56:35.525000 audit[1709]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.525000 audit[1709]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc8075be0 a2=0 a3=1 items=0 ppid=1607 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 13:56:35.527000 audit[1711]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.527000 audit[1711]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe54fd680 a2=0 a3=1 items=0 ppid=1607 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 13:56:35.528000 audit[1712]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.528000 audit[1712]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffa844290 a2=0 a3=1 items=0 ppid=1607 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.528000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 13:56:35.530000 audit[1714]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1714 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.530000 audit[1714]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffdb3d820 a2=0 a3=1 items=0 ppid=1607 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.530000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 13:56:35.533000 audit[1717]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.533000 audit[1717]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc8fb9880 a2=0 a3=1 items=0 ppid=1607 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 13:56:35.534000 audit[1718]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.534000 audit[1718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe2447070 a2=0 a3=1 items=0 ppid=1607 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.534000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 13:56:35.537000 audit[1720]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.537000 audit[1720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe818ea60 a2=0 a3=1 items=0 ppid=1607 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.537000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 13:56:35.538000 audit[1721]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.538000 audit[1721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffccb04f40 a2=0 a3=1 items=0 ppid=1607 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.538000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 13:56:35.540000 audit[1723]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1723 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.540000 audit[1723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd898d180 a2=0 a3=1 items=0 ppid=1607 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.540000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 13:56:35.543000 audit[1726]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1726 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.543000 audit[1726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc757a5f0 a2=0 a3=1 items=0 ppid=1607 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 13:56:35.546000 audit[1729]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1729 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.546000 audit[1729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcb47fa60 a2=0 a3=1 items=0 ppid=1607 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 13:56:35.547000 audit[1730]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.547000 audit[1730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd798cd90 a2=0 a3=1 items=0 ppid=1607 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.547000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 13:56:35.553000 audit[1732]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.553000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc70bee30 a2=0 a3=1 items=0 ppid=1607 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.553000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 13:56:35.558000 audit[1735]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.558000 audit[1735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffee5b6e50 a2=0 a3=1 items=0 ppid=1607 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.558000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 13:56:35.559000 audit[1736]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.559000 audit[1736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd4821b50 a2=0 a3=1 items=0 ppid=1607 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 13:56:35.562000 audit[1738]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.562000 audit[1738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffeaa82eb0 a2=0 a3=1 items=0 ppid=1607 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.562000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 13:56:35.564000 audit[1739]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.564000 audit[1739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9a57c10 a2=0 a3=1 items=0 ppid=1607 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 13:56:35.568000 audit[1741]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.568000 audit[1741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff6582a90 a2=0 a3=1 items=0 ppid=1607 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.568000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 13:56:35.574000 audit[1744]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 13:56:35.574000 audit[1744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc79a3e10 a2=0 a3=1 items=0 ppid=1607 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 13:56:35.580000 audit[1746]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 13:56:35.580000 audit[1746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffc761f940 a2=0 a3=1 items=0 ppid=1607 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.580000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:56:35.580000 audit[1746]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 13:56:35.580000 audit[1746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffc761f940 a2=0 a3=1 items=0 ppid=1607 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:35.580000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:56:35.607377 kubelet[1452]: E1213 13:56:35.607331 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:35.771948 kubelet[1452]: E1213 13:56:35.771561 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6tkwm" podUID="8da14905-625a-4f83-a34c-8ea13d6ed11a" Dec 13 13:56:35.781942 kubelet[1452]: E1213 13:56:35.781908 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:56:35.793197 kubelet[1452]: I1213 13:56:35.792863 1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-7jw9p" podStartSLOduration=4.323915264 podStartE2EDuration="5.792844133s" podCreationTimestamp="2024-12-13 13:56:30 +0000 UTC" firstStartedPulling="2024-12-13 13:56:33.59840639 +0000 UTC m=+3.749792636" lastFinishedPulling="2024-12-13 13:56:35.06733526 +0000 UTC m=+5.218721505" observedRunningTime="2024-12-13 13:56:35.79265265 +0000 UTC m=+5.944038856" watchObservedRunningTime="2024-12-13 13:56:35.792844133 +0000 UTC m=+5.944230379" Dec 13 13:56:35.837260 kubelet[1452]: E1213 13:56:35.837200 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.837260 kubelet[1452]: W1213 13:56:35.837246 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.837260 kubelet[1452]: E1213 13:56:35.837268 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.837503 kubelet[1452]: E1213 13:56:35.837479 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.837503 kubelet[1452]: W1213 13:56:35.837492 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.837503 kubelet[1452]: E1213 13:56:35.837502 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.837710 kubelet[1452]: E1213 13:56:35.837688 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.837710 kubelet[1452]: W1213 13:56:35.837703 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.837710 kubelet[1452]: E1213 13:56:35.837712 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.837892 kubelet[1452]: E1213 13:56:35.837872 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.837892 kubelet[1452]: W1213 13:56:35.837884 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.837892 kubelet[1452]: E1213 13:56:35.837893 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.838064 kubelet[1452]: E1213 13:56:35.838046 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.838094 kubelet[1452]: W1213 13:56:35.838057 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.838094 kubelet[1452]: E1213 13:56:35.838075 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.838226 kubelet[1452]: E1213 13:56:35.838203 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.838226 kubelet[1452]: W1213 13:56:35.838220 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.838226 kubelet[1452]: E1213 13:56:35.838229 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.838373 kubelet[1452]: E1213 13:56:35.838353 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.838373 kubelet[1452]: W1213 13:56:35.838370 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.838439 kubelet[1452]: E1213 13:56:35.838378 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.838551 kubelet[1452]: E1213 13:56:35.838530 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.838551 kubelet[1452]: W1213 13:56:35.838541 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.838551 kubelet[1452]: E1213 13:56:35.838549 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.838709 kubelet[1452]: E1213 13:56:35.838692 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.838709 kubelet[1452]: W1213 13:56:35.838702 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.838709 kubelet[1452]: E1213 13:56:35.838710 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.838859 kubelet[1452]: E1213 13:56:35.838843 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.838859 kubelet[1452]: W1213 13:56:35.838853 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.838912 kubelet[1452]: E1213 13:56:35.838861 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.839006 kubelet[1452]: E1213 13:56:35.838990 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.839006 kubelet[1452]: W1213 13:56:35.839000 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.839054 kubelet[1452]: E1213 13:56:35.839007 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.839160 kubelet[1452]: E1213 13:56:35.839139 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.839160 kubelet[1452]: W1213 13:56:35.839150 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.839160 kubelet[1452]: E1213 13:56:35.839157 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.839364 kubelet[1452]: E1213 13:56:35.839342 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.839364 kubelet[1452]: W1213 13:56:35.839353 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.839364 kubelet[1452]: E1213 13:56:35.839360 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.839518 kubelet[1452]: E1213 13:56:35.839497 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.839518 kubelet[1452]: W1213 13:56:35.839507 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.839518 kubelet[1452]: E1213 13:56:35.839514 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.839664 kubelet[1452]: E1213 13:56:35.839646 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.839664 kubelet[1452]: W1213 13:56:35.839656 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.839664 kubelet[1452]: E1213 13:56:35.839663 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.839815 kubelet[1452]: E1213 13:56:35.839796 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.839815 kubelet[1452]: W1213 13:56:35.839806 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.839815 kubelet[1452]: E1213 13:56:35.839813 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.839967 kubelet[1452]: E1213 13:56:35.839949 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.839967 kubelet[1452]: W1213 13:56:35.839959 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.839967 kubelet[1452]: E1213 13:56:35.839966 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.840119 kubelet[1452]: E1213 13:56:35.840099 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.840119 kubelet[1452]: W1213 13:56:35.840110 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.840119 kubelet[1452]: E1213 13:56:35.840118 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.840281 kubelet[1452]: E1213 13:56:35.840261 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.840281 kubelet[1452]: W1213 13:56:35.840272 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.840281 kubelet[1452]: E1213 13:56:35.840280 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.840443 kubelet[1452]: E1213 13:56:35.840421 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.840443 kubelet[1452]: W1213 13:56:35.840432 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.840443 kubelet[1452]: E1213 13:56:35.840439 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.857859 kubelet[1452]: E1213 13:56:35.857821 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.857859 kubelet[1452]: W1213 13:56:35.857844 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.857859 kubelet[1452]: E1213 13:56:35.857861 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.858049 kubelet[1452]: E1213 13:56:35.858034 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.858049 kubelet[1452]: W1213 13:56:35.858045 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.858097 kubelet[1452]: E1213 13:56:35.858054 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.858346 kubelet[1452]: E1213 13:56:35.858316 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.858346 kubelet[1452]: W1213 13:56:35.858330 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.858346 kubelet[1452]: E1213 13:56:35.858345 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.858517 kubelet[1452]: E1213 13:56:35.858492 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.858517 kubelet[1452]: W1213 13:56:35.858499 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.858517 kubelet[1452]: E1213 13:56:35.858512 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.858765 kubelet[1452]: E1213 13:56:35.858709 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.858765 kubelet[1452]: W1213 13:56:35.858717 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.858765 kubelet[1452]: E1213 13:56:35.858725 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.858978 kubelet[1452]: E1213 13:56:35.858904 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.858978 kubelet[1452]: W1213 13:56:35.858911 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.858978 kubelet[1452]: E1213 13:56:35.858919 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.859268 kubelet[1452]: E1213 13:56:35.859254 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.859403 kubelet[1452]: W1213 13:56:35.859274 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.859403 kubelet[1452]: E1213 13:56:35.859339 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.859484 kubelet[1452]: E1213 13:56:35.859422 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.859484 kubelet[1452]: W1213 13:56:35.859429 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.859484 kubelet[1452]: E1213 13:56:35.859438 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.859578 kubelet[1452]: E1213 13:56:35.859556 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.859578 kubelet[1452]: W1213 13:56:35.859569 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.859578 kubelet[1452]: E1213 13:56:35.859577 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.859712 kubelet[1452]: E1213 13:56:35.859686 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.859712 kubelet[1452]: W1213 13:56:35.859692 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.859712 kubelet[1452]: E1213 13:56:35.859699 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.859852 kubelet[1452]: E1213 13:56:35.859839 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.859852 kubelet[1452]: W1213 13:56:35.859849 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.859909 kubelet[1452]: E1213 13:56:35.859856 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.860188 kubelet[1452]: E1213 13:56:35.860168 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 13:56:35.860188 kubelet[1452]: W1213 13:56:35.860181 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 13:56:35.860270 kubelet[1452]: E1213 13:56:35.860190 1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 13:56:35.969783 env[1206]: time="2024-12-13T13:56:35.969170842Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:35.971389 env[1206]: time="2024-12-13T13:56:35.971348822Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:35.972610 env[1206]: time="2024-12-13T13:56:35.972576503Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:35.973945 env[1206]: time="2024-12-13T13:56:35.973897997Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:35.974644 env[1206]: time="2024-12-13T13:56:35.974501915Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348\"" Dec 13 13:56:35.977388 env[1206]: time="2024-12-13T13:56:35.977337818Z" level=info msg="CreateContainer within sandbox \"e337b86b33c0483134753996a4427b868006567cde72646b060a78e82664476f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 13:56:36.002383 env[1206]: time="2024-12-13T13:56:36.002330163Z" level=info msg="CreateContainer within sandbox \"e337b86b33c0483134753996a4427b868006567cde72646b060a78e82664476f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"7edd92a59a94ec6fa890254f139c1fdab23345d6e6b132fc5bb749fdd77d9ace\"" Dec 13 13:56:36.006262 env[1206]: time="2024-12-13T13:56:36.003184209Z" level=info msg="StartContainer for \"7edd92a59a94ec6fa890254f139c1fdab23345d6e6b132fc5bb749fdd77d9ace\"" Dec 13 13:56:36.026902 systemd[1]: Started cri-containerd-7edd92a59a94ec6fa890254f139c1fdab23345d6e6b132fc5bb749fdd77d9ace.scope. Dec 13 13:56:36.053000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.053000 audit[1788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1520 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:36.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646439326135396139346563366661383930323534663133396331 Dec 13 13:56:36.053000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.053000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.053000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.053000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.053000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.053000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.053000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.053000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.053000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.053000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.053000 audit: BPF prog-id=66 op=LOAD Dec 13 13:56:36.053000 audit[1788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1520 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:36.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646439326135396139346563366661383930323534663133396331 Dec 13 13:56:36.054000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.054000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.054000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.054000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.054000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.054000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.054000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.054000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.054000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.054000 audit: BPF prog-id=67 op=LOAD Dec 13 13:56:36.054000 audit[1788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1520 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:36.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646439326135396139346563366661383930323534663133396331 Dec 13 13:56:36.055000 audit: BPF prog-id=67 op=UNLOAD Dec 13 13:56:36.055000 audit: BPF prog-id=66 op=UNLOAD Dec 13 13:56:36.055000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.055000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.055000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.055000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.055000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.055000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.055000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.055000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.055000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.055000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:36.055000 audit: BPF prog-id=68 op=LOAD Dec 13 13:56:36.055000 audit[1788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1520 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:36.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646439326135396139346563366661383930323534663133396331 Dec 13 13:56:36.080370 env[1206]: time="2024-12-13T13:56:36.080320358Z" level=info msg="StartContainer for \"7edd92a59a94ec6fa890254f139c1fdab23345d6e6b132fc5bb749fdd77d9ace\" returns successfully" Dec 13 13:56:36.109899 systemd[1]: cri-containerd-7edd92a59a94ec6fa890254f139c1fdab23345d6e6b132fc5bb749fdd77d9ace.scope: Deactivated successfully. Dec 13 13:56:36.115000 audit: BPF prog-id=68 op=UNLOAD Dec 13 13:56:36.126723 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7edd92a59a94ec6fa890254f139c1fdab23345d6e6b132fc5bb749fdd77d9ace-rootfs.mount: Deactivated successfully. Dec 13 13:56:36.296562 env[1206]: time="2024-12-13T13:56:36.296444933Z" level=info msg="shim disconnected" id=7edd92a59a94ec6fa890254f139c1fdab23345d6e6b132fc5bb749fdd77d9ace Dec 13 13:56:36.296562 env[1206]: time="2024-12-13T13:56:36.296492650Z" level=warning msg="cleaning up after shim disconnected" id=7edd92a59a94ec6fa890254f139c1fdab23345d6e6b132fc5bb749fdd77d9ace namespace=k8s.io Dec 13 13:56:36.296562 env[1206]: time="2024-12-13T13:56:36.296502639Z" level=info msg="cleaning up dead shim" Dec 13 13:56:36.304596 env[1206]: time="2024-12-13T13:56:36.304551799Z" level=warning msg="cleanup warnings time=\"2024-12-13T13:56:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1826 runtime=io.containerd.runc.v2\n" Dec 13 13:56:36.607792 kubelet[1452]: E1213 13:56:36.607584 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:36.784120 kubelet[1452]: E1213 13:56:36.783778 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:56:36.784120 kubelet[1452]: E1213 13:56:36.783819 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:56:36.784547 env[1206]: time="2024-12-13T13:56:36.784500984Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 13:56:37.607843 kubelet[1452]: E1213 13:56:37.607801 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:37.770967 kubelet[1452]: E1213 13:56:37.770905 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6tkwm" podUID="8da14905-625a-4f83-a34c-8ea13d6ed11a" Dec 13 13:56:38.608435 kubelet[1452]: E1213 13:56:38.608389 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:39.592213 env[1206]: time="2024-12-13T13:56:39.592170619Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:39.595926 env[1206]: time="2024-12-13T13:56:39.595887225Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:39.597516 env[1206]: time="2024-12-13T13:56:39.597489562Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:39.598777 env[1206]: time="2024-12-13T13:56:39.598749505Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:39.599415 env[1206]: time="2024-12-13T13:56:39.599390918Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f\"" Dec 13 13:56:39.601580 env[1206]: time="2024-12-13T13:56:39.601550434Z" level=info msg="CreateContainer within sandbox \"e337b86b33c0483134753996a4427b868006567cde72646b060a78e82664476f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 13:56:39.609081 kubelet[1452]: E1213 13:56:39.609039 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:39.621991 env[1206]: time="2024-12-13T13:56:39.621935243Z" level=info msg="CreateContainer within sandbox \"e337b86b33c0483134753996a4427b868006567cde72646b060a78e82664476f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"548b178f5a56bc21a679b2be534e1e26874bca61b680afd08840fecf50ff053e\"" Dec 13 13:56:39.622526 env[1206]: time="2024-12-13T13:56:39.622494575Z" level=info msg="StartContainer for \"548b178f5a56bc21a679b2be534e1e26874bca61b680afd08840fecf50ff053e\"" Dec 13 13:56:39.642925 systemd[1]: Started cri-containerd-548b178f5a56bc21a679b2be534e1e26874bca61b680afd08840fecf50ff053e.scope. Dec 13 13:56:39.665000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.665000 audit[1851]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1520 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:39.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534386231373866356135366263323161363739623262653533346531 Dec 13 13:56:39.665000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.665000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.665000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.665000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.665000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.665000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.665000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.665000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.665000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.665000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.665000 audit: BPF prog-id=69 op=LOAD Dec 13 13:56:39.665000 audit[1851]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1520 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:39.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534386231373866356135366263323161363739623262653533346531 Dec 13 13:56:39.666000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.666000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.666000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.666000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.666000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.666000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.666000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.666000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.666000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.666000 audit: BPF prog-id=70 op=LOAD Dec 13 13:56:39.666000 audit[1851]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1520 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:39.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534386231373866356135366263323161363739623262653533346531 Dec 13 13:56:39.666000 audit: BPF prog-id=70 op=UNLOAD Dec 13 13:56:39.666000 audit: BPF prog-id=69 op=UNLOAD Dec 13 13:56:39.666000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.666000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.666000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.666000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.666000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.666000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.666000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.666000 audit[1851]: AVC avc: denied { perfmon } for pid=1851 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.666000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.666000 audit[1851]: AVC avc: denied { bpf } for pid=1851 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:39.666000 audit: BPF prog-id=71 op=LOAD Dec 13 13:56:39.666000 audit[1851]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1520 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:39.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534386231373866356135366263323161363739623262653533346531 Dec 13 13:56:39.690222 env[1206]: time="2024-12-13T13:56:39.688936252Z" level=info msg="StartContainer for \"548b178f5a56bc21a679b2be534e1e26874bca61b680afd08840fecf50ff053e\" returns successfully" Dec 13 13:56:39.771396 kubelet[1452]: E1213 13:56:39.771265 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6tkwm" podUID="8da14905-625a-4f83-a34c-8ea13d6ed11a" Dec 13 13:56:39.790508 kubelet[1452]: E1213 13:56:39.790394 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:56:40.268370 env[1206]: time="2024-12-13T13:56:40.268314096Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 13:56:40.270495 systemd[1]: cri-containerd-548b178f5a56bc21a679b2be534e1e26874bca61b680afd08840fecf50ff053e.scope: Deactivated successfully. Dec 13 13:56:40.278000 audit: BPF prog-id=71 op=UNLOAD Dec 13 13:56:40.279517 kernel: kauditd_printk_skb: 273 callbacks suppressed Dec 13 13:56:40.279573 kernel: audit: type=1334 audit(1734098200.278:518): prog-id=71 op=UNLOAD Dec 13 13:56:40.305228 kubelet[1452]: I1213 13:56:40.304988 1452 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 13:56:40.379936 env[1206]: time="2024-12-13T13:56:40.379878920Z" level=info msg="shim disconnected" id=548b178f5a56bc21a679b2be534e1e26874bca61b680afd08840fecf50ff053e Dec 13 13:56:40.379936 env[1206]: time="2024-12-13T13:56:40.379924703Z" level=warning msg="cleaning up after shim disconnected" id=548b178f5a56bc21a679b2be534e1e26874bca61b680afd08840fecf50ff053e namespace=k8s.io Dec 13 13:56:40.379936 env[1206]: time="2024-12-13T13:56:40.379935670Z" level=info msg="cleaning up dead shim" Dec 13 13:56:40.386976 env[1206]: time="2024-12-13T13:56:40.386924546Z" level=warning msg="cleanup warnings time=\"2024-12-13T13:56:40Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1893 runtime=io.containerd.runc.v2\n" Dec 13 13:56:40.610020 kubelet[1452]: E1213 13:56:40.609893 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:40.615397 systemd[1]: run-containerd-runc-k8s.io-548b178f5a56bc21a679b2be534e1e26874bca61b680afd08840fecf50ff053e-runc.DzDAm3.mount: Deactivated successfully. Dec 13 13:56:40.615488 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-548b178f5a56bc21a679b2be534e1e26874bca61b680afd08840fecf50ff053e-rootfs.mount: Deactivated successfully. Dec 13 13:56:40.792822 kubelet[1452]: E1213 13:56:40.792776 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:56:40.793599 env[1206]: time="2024-12-13T13:56:40.793555591Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 13:56:41.610975 kubelet[1452]: E1213 13:56:41.610898 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:41.775667 systemd[1]: Created slice kubepods-besteffort-pod8da14905_625a_4f83_a34c_8ea13d6ed11a.slice. Dec 13 13:56:41.779362 env[1206]: time="2024-12-13T13:56:41.779313502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6tkwm,Uid:8da14905-625a-4f83-a34c-8ea13d6ed11a,Namespace:calico-system,Attempt:0,}" Dec 13 13:56:41.916115 kubelet[1452]: I1213 13:56:41.915966 1452 topology_manager.go:215] "Topology Admit Handler" podUID="1646a1a4-8cfe-4cb8-8267-3eda01835546" podNamespace="default" podName="nginx-deployment-85f456d6dd-f45xp" Dec 13 13:56:41.920887 systemd[1]: Created slice kubepods-besteffort-pod1646a1a4_8cfe_4cb8_8267_3eda01835546.slice. Dec 13 13:56:41.990827 env[1206]: time="2024-12-13T13:56:41.990754562Z" level=error msg="Failed to destroy network for sandbox \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:56:41.991526 env[1206]: time="2024-12-13T13:56:41.991489924Z" level=error msg="encountered an error cleaning up failed sandbox \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:56:41.991664 env[1206]: time="2024-12-13T13:56:41.991636063Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6tkwm,Uid:8da14905-625a-4f83-a34c-8ea13d6ed11a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:56:41.993286 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148-shm.mount: Deactivated successfully. Dec 13 13:56:41.994028 kubelet[1452]: E1213 13:56:41.993967 1452 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:56:41.994095 kubelet[1452]: E1213 13:56:41.994050 1452 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6tkwm" Dec 13 13:56:41.994095 kubelet[1452]: E1213 13:56:41.994073 1452 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6tkwm" Dec 13 13:56:41.994159 kubelet[1452]: E1213 13:56:41.994125 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-6tkwm_calico-system(8da14905-625a-4f83-a34c-8ea13d6ed11a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-6tkwm_calico-system(8da14905-625a-4f83-a34c-8ea13d6ed11a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6tkwm" podUID="8da14905-625a-4f83-a34c-8ea13d6ed11a" Dec 13 13:56:41.995137 kubelet[1452]: I1213 13:56:41.995113 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sc2k8\" (UniqueName: \"kubernetes.io/projected/1646a1a4-8cfe-4cb8-8267-3eda01835546-kube-api-access-sc2k8\") pod \"nginx-deployment-85f456d6dd-f45xp\" (UID: \"1646a1a4-8cfe-4cb8-8267-3eda01835546\") " pod="default/nginx-deployment-85f456d6dd-f45xp" Dec 13 13:56:42.223646 env[1206]: time="2024-12-13T13:56:42.223543189Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-f45xp,Uid:1646a1a4-8cfe-4cb8-8267-3eda01835546,Namespace:default,Attempt:0,}" Dec 13 13:56:42.272549 env[1206]: time="2024-12-13T13:56:42.272490459Z" level=error msg="Failed to destroy network for sandbox \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:56:42.272872 env[1206]: time="2024-12-13T13:56:42.272841817Z" level=error msg="encountered an error cleaning up failed sandbox \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:56:42.272922 env[1206]: time="2024-12-13T13:56:42.272892701Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-f45xp,Uid:1646a1a4-8cfe-4cb8-8267-3eda01835546,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:56:42.273519 kubelet[1452]: E1213 13:56:42.273111 1452 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:56:42.273519 kubelet[1452]: E1213 13:56:42.273180 1452 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-f45xp" Dec 13 13:56:42.273519 kubelet[1452]: E1213 13:56:42.273200 1452 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-f45xp" Dec 13 13:56:42.273662 kubelet[1452]: E1213 13:56:42.273259 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-f45xp_default(1646a1a4-8cfe-4cb8-8267-3eda01835546)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-f45xp_default(1646a1a4-8cfe-4cb8-8267-3eda01835546)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-f45xp" podUID="1646a1a4-8cfe-4cb8-8267-3eda01835546" Dec 13 13:56:42.611409 kubelet[1452]: E1213 13:56:42.611221 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:42.801136 kubelet[1452]: I1213 13:56:42.801094 1452 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" Dec 13 13:56:42.801908 env[1206]: time="2024-12-13T13:56:42.801871457Z" level=info msg="StopPodSandbox for \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\"" Dec 13 13:56:42.802935 kubelet[1452]: I1213 13:56:42.802912 1452 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" Dec 13 13:56:42.803451 env[1206]: time="2024-12-13T13:56:42.803418127Z" level=info msg="StopPodSandbox for \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\"" Dec 13 13:56:42.829409 env[1206]: time="2024-12-13T13:56:42.829350673Z" level=error msg="StopPodSandbox for \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\" failed" error="failed to destroy network for sandbox \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:56:42.829907 kubelet[1452]: E1213 13:56:42.829705 1452 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" Dec 13 13:56:42.829907 kubelet[1452]: E1213 13:56:42.829770 1452 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31"} Dec 13 13:56:42.829907 kubelet[1452]: E1213 13:56:42.829840 1452 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1646a1a4-8cfe-4cb8-8267-3eda01835546\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 13:56:42.829907 kubelet[1452]: E1213 13:56:42.829863 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1646a1a4-8cfe-4cb8-8267-3eda01835546\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-f45xp" podUID="1646a1a4-8cfe-4cb8-8267-3eda01835546" Dec 13 13:56:42.837366 env[1206]: time="2024-12-13T13:56:42.837315459Z" level=error msg="StopPodSandbox for \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\" failed" error="failed to destroy network for sandbox \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 13:56:42.837859 kubelet[1452]: E1213 13:56:42.837699 1452 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" Dec 13 13:56:42.837859 kubelet[1452]: E1213 13:56:42.837741 1452 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148"} Dec 13 13:56:42.837859 kubelet[1452]: E1213 13:56:42.837788 1452 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8da14905-625a-4f83-a34c-8ea13d6ed11a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 13:56:42.837859 kubelet[1452]: E1213 13:56:42.837809 1452 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8da14905-625a-4f83-a34c-8ea13d6ed11a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6tkwm" podUID="8da14905-625a-4f83-a34c-8ea13d6ed11a" Dec 13 13:56:43.612261 kubelet[1452]: E1213 13:56:43.612191 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:44.612550 kubelet[1452]: E1213 13:56:44.612489 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:45.017370 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2890834692.mount: Deactivated successfully. Dec 13 13:56:45.361163 env[1206]: time="2024-12-13T13:56:45.360855737Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:45.363413 env[1206]: time="2024-12-13T13:56:45.363369936Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:45.365342 env[1206]: time="2024-12-13T13:56:45.365316483Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:45.366098 env[1206]: time="2024-12-13T13:56:45.366074126Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:45.366573 env[1206]: time="2024-12-13T13:56:45.366544887Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758\"" Dec 13 13:56:45.377986 env[1206]: time="2024-12-13T13:56:45.377942197Z" level=info msg="CreateContainer within sandbox \"e337b86b33c0483134753996a4427b868006567cde72646b060a78e82664476f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 13:56:45.391297 env[1206]: time="2024-12-13T13:56:45.391231777Z" level=info msg="CreateContainer within sandbox \"e337b86b33c0483134753996a4427b868006567cde72646b060a78e82664476f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7a99bcb3b278dd21d8ea85fb0123d3747d33f8b3901aa27601da60e0af7f49e1\"" Dec 13 13:56:45.391690 env[1206]: time="2024-12-13T13:56:45.391665076Z" level=info msg="StartContainer for \"7a99bcb3b278dd21d8ea85fb0123d3747d33f8b3901aa27601da60e0af7f49e1\"" Dec 13 13:56:45.405935 systemd[1]: Started cri-containerd-7a99bcb3b278dd21d8ea85fb0123d3747d33f8b3901aa27601da60e0af7f49e1.scope. Dec 13 13:56:45.434000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.434000 audit[2042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1520 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:45.440191 kernel: audit: type=1400 audit(1734098205.434:519): avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.440265 kernel: audit: type=1300 audit(1734098205.434:519): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1520 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:45.440297 kernel: audit: type=1327 audit(1734098205.434:519): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393962636233623237386464323164386561383566623031323364 Dec 13 13:56:45.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393962636233623237386464323164386561383566623031323364 Dec 13 13:56:45.442602 kernel: audit: type=1400 audit(1734098205.434:520): avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.434000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.434000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.446109 kernel: audit: type=1400 audit(1734098205.434:520): avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.434000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.448338 kernel: audit: type=1400 audit(1734098205.434:520): avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.448389 kernel: audit: type=1400 audit(1734098205.434:520): avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.434000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.450094 kernel: audit: type=1400 audit(1734098205.434:520): avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.434000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.453160 kernel: audit: type=1400 audit(1734098205.434:520): avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.434000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.453431 kernel: audit: type=1400 audit(1734098205.434:520): avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.434000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.434000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.434000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.434000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.434000 audit: BPF prog-id=72 op=LOAD Dec 13 13:56:45.434000 audit[2042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1520 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:45.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393962636233623237386464323164386561383566623031323364 Dec 13 13:56:45.436000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.436000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.436000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.436000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.436000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.436000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.436000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.436000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.436000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.436000 audit: BPF prog-id=73 op=LOAD Dec 13 13:56:45.436000 audit[2042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1520 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:45.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393962636233623237386464323164386561383566623031323364 Dec 13 13:56:45.439000 audit: BPF prog-id=73 op=UNLOAD Dec 13 13:56:45.439000 audit: BPF prog-id=72 op=UNLOAD Dec 13 13:56:45.439000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.439000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.439000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.439000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.439000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.439000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.439000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.439000 audit[2042]: AVC avc: denied { perfmon } for pid=2042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.439000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.439000 audit[2042]: AVC avc: denied { bpf } for pid=2042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:45.439000 audit: BPF prog-id=74 op=LOAD Dec 13 13:56:45.439000 audit[2042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1520 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:45.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393962636233623237386464323164386561383566623031323364 Dec 13 13:56:45.467258 env[1206]: time="2024-12-13T13:56:45.466094504Z" level=info msg="StartContainer for \"7a99bcb3b278dd21d8ea85fb0123d3747d33f8b3901aa27601da60e0af7f49e1\" returns successfully" Dec 13 13:56:45.612872 kubelet[1452]: E1213 13:56:45.612766 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:45.630657 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 13:56:45.630754 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 13:56:45.809256 kubelet[1452]: E1213 13:56:45.809156 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:56:46.613673 kubelet[1452]: E1213 13:56:46.613623 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:46.809898 kubelet[1452]: I1213 13:56:46.809856 1452 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 13:56:46.810640 kubelet[1452]: E1213 13:56:46.810590 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:56:46.883000 audit[2152]: AVC avc: denied { write } for pid=2152 comm="tee" name="fd" dev="proc" ino=13192 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:56:46.883000 audit[2152]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffa821a2a a2=241 a3=1b6 items=1 ppid=2111 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:46.883000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 13:56:46.883000 audit: PATH item=0 name="/dev/fd/63" inode=15454 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:56:46.883000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:56:46.885000 audit[2156]: AVC avc: denied { write } for pid=2156 comm="tee" name="fd" dev="proc" ino=13995 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:56:46.885000 audit[2156]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffff9e1a1a a2=241 a3=1b6 items=1 ppid=2119 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:46.885000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 13:56:46.885000 audit: PATH item=0 name="/dev/fd/63" inode=15455 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:56:46.885000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:56:46.889000 audit[2158]: AVC avc: denied { write } for pid=2158 comm="tee" name="fd" dev="proc" ino=14001 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:56:46.889000 audit[2158]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe7efaa1b a2=241 a3=1b6 items=1 ppid=2120 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:46.889000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 13:56:46.889000 audit: PATH item=0 name="/dev/fd/63" inode=15456 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:56:46.889000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:56:46.891000 audit[2170]: AVC avc: denied { write } for pid=2170 comm="tee" name="fd" dev="proc" ino=14006 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:56:46.891000 audit[2170]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffaadba2a a2=241 a3=1b6 items=1 ppid=2117 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:46.891000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 13:56:46.891000 audit: PATH item=0 name="/dev/fd/63" inode=14656 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:56:46.891000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:56:46.898000 audit[2161]: AVC avc: denied { write } for pid=2161 comm="tee" name="fd" dev="proc" ino=14663 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:56:46.898000 audit[2161]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffddefa2c a2=241 a3=1b6 items=1 ppid=2112 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:46.898000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 13:56:46.898000 audit: PATH item=0 name="/dev/fd/63" inode=13992 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:56:46.898000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:56:46.904000 audit[2180]: AVC avc: denied { write } for pid=2180 comm="tee" name="fd" dev="proc" ino=15459 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:56:46.904000 audit[2180]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe16eaa2b a2=241 a3=1b6 items=1 ppid=2116 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:46.904000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 13:56:46.904000 audit: PATH item=0 name="/dev/fd/63" inode=14005 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:56:46.904000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:56:46.912000 audit[2193]: AVC avc: denied { write } for pid=2193 comm="tee" name="fd" dev="proc" ino=15470 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 13:56:46.912000 audit[2193]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffef82aa2a a2=241 a3=1b6 items=1 ppid=2110 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:46.912000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 13:56:46.912000 audit: PATH item=0 name="/dev/fd/63" inode=14015 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:56:46.912000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit: BPF prog-id=75 op=LOAD Dec 13 13:56:47.000000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffad8d3c8 a2=98 a3=fffffad8d3b8 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.000000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.000000 audit: BPF prog-id=75 op=UNLOAD Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit: BPF prog-id=76 op=LOAD Dec 13 13:56:47.000000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffad8d058 a2=74 a3=95 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.000000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.000000 audit: BPF prog-id=76 op=UNLOAD Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.000000 audit: BPF prog-id=77 op=LOAD Dec 13 13:56:47.000000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffad8d0b8 a2=94 a3=2 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.000000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.000000 audit: BPF prog-id=77 op=UNLOAD Dec 13 13:56:47.083000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.083000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.083000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.083000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.083000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.083000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.083000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.083000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.083000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.083000 audit: BPF prog-id=78 op=LOAD Dec 13 13:56:47.083000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffad8d078 a2=40 a3=fffffad8d0a8 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.083000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.083000 audit: BPF prog-id=78 op=UNLOAD Dec 13 13:56:47.083000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.083000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffffad8d190 a2=50 a3=0 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.083000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffad8d0e8 a2=28 a3=fffffad8d218 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffad8d118 a2=28 a3=fffffad8d248 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffad8cfc8 a2=28 a3=fffffad8d0f8 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffad8d138 a2=28 a3=fffffad8d268 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffad8d118 a2=28 a3=fffffad8d248 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffad8d108 a2=28 a3=fffffad8d238 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffad8d138 a2=28 a3=fffffad8d268 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffad8d118 a2=28 a3=fffffad8d248 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffad8d138 a2=28 a3=fffffad8d268 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffad8d108 a2=28 a3=fffffad8d238 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffad8d188 a2=28 a3=fffffad8d2c8 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffad8cec0 a2=50 a3=0 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit: BPF prog-id=79 op=LOAD Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffad8cec8 a2=94 a3=5 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.092000 audit: BPF prog-id=79 op=UNLOAD Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffad8cfd0 a2=50 a3=0 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffffad8d118 a2=4 a3=3 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.092000 audit[2231]: AVC avc: denied { confidentiality } for pid=2231 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffad8d0f8 a2=94 a3=6 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.093000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.093000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.093000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.093000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.093000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.093000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.093000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.093000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.093000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.093000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.093000 audit[2231]: AVC avc: denied { confidentiality } for pid=2231 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:56:47.093000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffad8c8c8 a2=94 a3=83 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.093000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.093000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.093000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.093000 audit[2231]: AVC avc: denied { bpf } for pid=2231 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.093000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.093000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.093000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.093000 audit[2231]: AVC avc: denied { perfmon } for pid=2231 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.093000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffad8c8c8 a2=94 a3=83 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit: BPF prog-id=80 op=LOAD Dec 13 13:56:47.104000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe92c4078 a2=98 a3=ffffe92c4068 items=0 ppid=2115 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.104000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 13:56:47.104000 audit: BPF prog-id=80 op=UNLOAD Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit: BPF prog-id=81 op=LOAD Dec 13 13:56:47.104000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe92c3f28 a2=74 a3=95 items=0 ppid=2115 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.104000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 13:56:47.104000 audit: BPF prog-id=81 op=UNLOAD Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.104000 audit: BPF prog-id=82 op=LOAD Dec 13 13:56:47.104000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe92c3f58 a2=40 a3=ffffe92c3f88 items=0 ppid=2115 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.104000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 13:56:47.104000 audit: BPF prog-id=82 op=UNLOAD Dec 13 13:56:47.151801 systemd-networkd[1035]: vxlan.calico: Link UP Dec 13 13:56:47.151810 systemd-networkd[1035]: vxlan.calico: Gained carrier Dec 13 13:56:47.169000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.169000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.169000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.169000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.169000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.169000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.169000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.169000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.169000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.169000 audit: BPF prog-id=83 op=LOAD Dec 13 13:56:47.169000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdfe70708 a2=98 a3=ffffdfe706f8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.169000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:56:47.170000 audit: BPF prog-id=83 op=UNLOAD Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit: BPF prog-id=84 op=LOAD Dec 13 13:56:47.170000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdfe703e8 a2=74 a3=95 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.170000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:56:47.170000 audit: BPF prog-id=84 op=UNLOAD Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit: BPF prog-id=85 op=LOAD Dec 13 13:56:47.170000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdfe70448 a2=94 a3=2 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.170000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:56:47.170000 audit: BPF prog-id=85 op=UNLOAD Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdfe70478 a2=28 a3=ffffdfe705a8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.170000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdfe704a8 a2=28 a3=ffffdfe705d8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.170000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdfe70358 a2=28 a3=ffffdfe70488 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.170000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdfe704c8 a2=28 a3=ffffdfe705f8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.170000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdfe704a8 a2=28 a3=ffffdfe705d8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.170000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:56:47.170000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.170000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdfe70498 a2=28 a3=ffffdfe705c8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.170000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:56:47.173000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.173000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdfe704c8 a2=28 a3=ffffdfe705f8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:56:47.173000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.173000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdfe704a8 a2=28 a3=ffffdfe705d8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:56:47.173000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.173000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdfe704c8 a2=28 a3=ffffdfe705f8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:56:47.173000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.173000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdfe70498 a2=28 a3=ffffdfe705c8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:56:47.173000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.173000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdfe70518 a2=28 a3=ffffdfe70658 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:56:47.173000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.173000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.173000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.173000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.173000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.173000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.173000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.173000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.173000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.173000 audit: BPF prog-id=86 op=LOAD Dec 13 13:56:47.173000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdfe70338 a2=40 a3=ffffdfe70368 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:56:47.173000 audit: BPF prog-id=86 op=UNLOAD Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffdfe70360 a2=50 a3=0 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.174000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffdfe70360 a2=50 a3=0 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.174000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit: BPF prog-id=87 op=LOAD Dec 13 13:56:47.174000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdfe6fac8 a2=94 a3=2 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.174000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:56:47.174000 audit: BPF prog-id=87 op=UNLOAD Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.174000 audit: BPF prog-id=88 op=LOAD Dec 13 13:56:47.174000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdfe6fc58 a2=94 a3=2d items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.174000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit: BPF prog-id=89 op=LOAD Dec 13 13:56:47.179000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff3eac638 a2=98 a3=fffff3eac628 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.179000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.179000 audit: BPF prog-id=89 op=UNLOAD Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit: BPF prog-id=90 op=LOAD Dec 13 13:56:47.179000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff3eac2c8 a2=74 a3=95 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.179000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.179000 audit: BPF prog-id=90 op=UNLOAD Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.179000 audit: BPF prog-id=91 op=LOAD Dec 13 13:56:47.179000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff3eac328 a2=94 a3=2 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.179000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.179000 audit: BPF prog-id=91 op=UNLOAD Dec 13 13:56:47.262000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.262000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.262000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.262000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.262000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.262000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.262000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.262000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.262000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.262000 audit: BPF prog-id=92 op=LOAD Dec 13 13:56:47.262000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff3eac2e8 a2=40 a3=fffff3eac318 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.262000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.262000 audit: BPF prog-id=92 op=UNLOAD Dec 13 13:56:47.262000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.262000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff3eac400 a2=50 a3=0 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.262000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.271000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.271000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff3eac358 a2=28 a3=fffff3eac488 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.271000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.271000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff3eac388 a2=28 a3=fffff3eac4b8 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.271000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.271000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff3eac238 a2=28 a3=fffff3eac368 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.271000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.271000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff3eac3a8 a2=28 a3=fffff3eac4d8 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.271000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.271000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff3eac388 a2=28 a3=fffff3eac4b8 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.271000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.271000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff3eac378 a2=28 a3=fffff3eac4a8 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.271000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.271000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff3eac3a8 a2=28 a3=fffff3eac4d8 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff3eac388 a2=28 a3=fffff3eac4b8 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff3eac3a8 a2=28 a3=fffff3eac4d8 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff3eac378 a2=28 a3=fffff3eac4a8 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff3eac3f8 a2=28 a3=fffff3eac538 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff3eac130 a2=50 a3=0 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit: BPF prog-id=93 op=LOAD Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff3eac138 a2=94 a3=5 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.272000 audit: BPF prog-id=93 op=UNLOAD Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff3eac240 a2=50 a3=0 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff3eac388 a2=4 a3=3 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { confidentiality } for pid=2271 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff3eac368 a2=94 a3=6 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { confidentiality } for pid=2271 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff3eabb38 a2=94 a3=83 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.272000 audit[2271]: AVC avc: denied { confidentiality } for pid=2271 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff3eabb38 a2=94 a3=83 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.273000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.273000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff3ead578 a2=10 a3=fffff3ead668 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.273000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.273000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.273000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff3ead438 a2=10 a3=fffff3ead528 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.273000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.273000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.273000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff3ead3a8 a2=10 a3=fffff3ead528 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.273000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.273000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:47.273000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff3ead3a8 a2=10 a3=fffff3ead528 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.273000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 13:56:47.279000 audit: BPF prog-id=88 op=UNLOAD Dec 13 13:56:47.321000 audit[2292]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:56:47.321000 audit[2292]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc0aab4b0 a2=0 a3=ffff8c690fa8 items=0 ppid=2115 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.321000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:56:47.333000 audit[2295]: NETFILTER_CFG table=filter:66 family=2 entries=39 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:56:47.333000 audit[2295]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffe70c9420 a2=0 a3=ffffabad2fa8 items=0 ppid=2115 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.333000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:56:47.334000 audit[2294]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:56:47.334000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffcccadd20 a2=0 a3=ffffab49bfa8 items=0 ppid=2115 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.334000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:56:47.335000 audit[2291]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:56:47.335000 audit[2291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffc73d6c60 a2=0 a3=ffffb0794fa8 items=0 ppid=2115 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:47.335000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:56:47.367949 systemd[1]: run-containerd-runc-k8s.io-7a99bcb3b278dd21d8ea85fb0123d3747d33f8b3901aa27601da60e0af7f49e1-runc.HyWdNt.mount: Deactivated successfully. Dec 13 13:56:47.614738 kubelet[1452]: E1213 13:56:47.614622 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:47.812107 kubelet[1452]: E1213 13:56:47.812067 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:56:48.172000 audit[2373]: NETFILTER_CFG table=filter:69 family=2 entries=13 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:56:48.172000 audit[2373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff9b2cd10 a2=0 a3=1 items=0 ppid=1607 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:48.172000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:56:48.182000 audit[2373]: NETFILTER_CFG table=nat:70 family=2 entries=35 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:56:48.182000 audit[2373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=fffff9b2cd10 a2=0 a3=1 items=0 ppid=1607 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:48.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:56:48.510486 systemd-networkd[1035]: vxlan.calico: Gained IPv6LL Dec 13 13:56:48.615449 kubelet[1452]: E1213 13:56:48.615413 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:49.616378 kubelet[1452]: E1213 13:56:49.616341 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:50.182000 audit[2379]: NETFILTER_CFG table=filter:71 family=2 entries=10 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:56:50.182000 audit[2379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd7a95d70 a2=0 a3=1 items=0 ppid=1607 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:50.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:56:50.193000 audit[2379]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:56:50.193000 audit[2379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd7a95d70 a2=0 a3=1 items=0 ppid=1607 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:50.193000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:56:50.209000 audit[2381]: NETFILTER_CFG table=filter:73 family=2 entries=10 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:56:50.209000 audit[2381]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc8acd210 a2=0 a3=1 items=0 ppid=1607 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:50.209000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:56:50.220000 audit[2381]: NETFILTER_CFG table=nat:74 family=2 entries=44 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:56:50.220000 audit[2381]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffc8acd210 a2=0 a3=1 items=0 ppid=1607 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:50.220000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:56:50.605081 kubelet[1452]: E1213 13:56:50.604593 1452 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:50.616949 kubelet[1452]: E1213 13:56:50.616907 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:51.182000 audit[2383]: NETFILTER_CFG table=filter:75 family=2 entries=10 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:56:51.185734 kernel: kauditd_printk_skb: 572 callbacks suppressed Dec 13 13:56:51.185786 kernel: audit: type=1325 audit(1734098211.182:633): table=filter:75 family=2 entries=10 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:56:51.182000 audit[2383]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffd22d280 a2=0 a3=1 items=0 ppid=1607 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:51.189893 kernel: audit: type=1300 audit(1734098211.182:633): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffd22d280 a2=0 a3=1 items=0 ppid=1607 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:51.189972 kernel: audit: type=1327 audit(1734098211.182:633): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:56:51.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:56:51.191000 audit[2383]: NETFILTER_CFG table=nat:76 family=2 entries=20 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:56:51.191000 audit[2383]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffd22d280 a2=0 a3=1 items=0 ppid=1607 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:51.197003 kernel: audit: type=1325 audit(1734098211.191:634): table=nat:76 family=2 entries=20 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:56:51.197066 kernel: audit: type=1300 audit(1734098211.191:634): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffd22d280 a2=0 a3=1 items=0 ppid=1607 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:51.197092 kernel: audit: type=1327 audit(1734098211.191:634): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:56:51.191000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:56:51.618004 kubelet[1452]: E1213 13:56:51.617837 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:52.212000 audit[2385]: NETFILTER_CFG table=filter:77 family=2 entries=9 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:56:52.212000 audit[2385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc05b8230 a2=0 a3=1 items=0 ppid=1607 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:52.218118 kernel: audit: type=1325 audit(1734098212.212:635): table=filter:77 family=2 entries=9 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:56:52.218262 kernel: audit: type=1300 audit(1734098212.212:635): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc05b8230 a2=0 a3=1 items=0 ppid=1607 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:52.218297 kernel: audit: type=1327 audit(1734098212.212:635): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:56:52.212000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:56:52.229000 audit[2385]: NETFILTER_CFG table=nat:78 family=2 entries=63 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:56:52.229000 audit[2385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23436 a0=3 a1=ffffc05b8230 a2=0 a3=1 items=0 ppid=1607 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:52.229000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:56:52.234297 kernel: audit: type=1325 audit(1734098212.229:636): table=nat:78 family=2 entries=63 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:56:52.618907 kubelet[1452]: E1213 13:56:52.618801 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:53.250000 audit[2397]: NETFILTER_CFG table=filter:79 family=2 entries=8 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:56:53.250000 audit[2397]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc34ef9a0 a2=0 a3=1 items=0 ppid=1607 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:53.250000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:56:53.256000 audit[2397]: NETFILTER_CFG table=nat:80 family=2 entries=34 op=nft_register_chain pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:56:53.256000 audit[2397]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffc34ef9a0 a2=0 a3=1 items=0 ppid=1607 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:53.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:56:53.620557 kubelet[1452]: E1213 13:56:53.620406 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:53.772276 env[1206]: time="2024-12-13T13:56:53.772205054Z" level=info msg="StopPodSandbox for \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\"" Dec 13 13:56:53.819958 kubelet[1452]: I1213 13:56:53.819892 1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-wqwlk" podStartSLOduration=12.052500738 podStartE2EDuration="23.81987246s" podCreationTimestamp="2024-12-13 13:56:30 +0000 UTC" firstStartedPulling="2024-12-13 13:56:33.600270209 +0000 UTC m=+3.751656455" lastFinishedPulling="2024-12-13 13:56:45.367641931 +0000 UTC m=+15.519028177" observedRunningTime="2024-12-13 13:56:45.828484352 +0000 UTC m=+15.979870598" watchObservedRunningTime="2024-12-13 13:56:53.81987246 +0000 UTC m=+23.971258706" Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.819 [INFO][2414] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.819 [INFO][2414] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" iface="eth0" netns="/var/run/netns/cni-34a12ba4-c8fc-0bdf-fc00-366615ad385a" Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.820 [INFO][2414] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" iface="eth0" netns="/var/run/netns/cni-34a12ba4-c8fc-0bdf-fc00-366615ad385a" Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.820 [INFO][2414] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" iface="eth0" netns="/var/run/netns/cni-34a12ba4-c8fc-0bdf-fc00-366615ad385a" Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.820 [INFO][2414] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.820 [INFO][2414] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.873 [INFO][2421] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" HandleID="k8s-pod-network.dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" Workload="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0" Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.873 [INFO][2421] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.874 [INFO][2421] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.885 [WARNING][2421] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" HandleID="k8s-pod-network.dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" Workload="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0" Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.885 [INFO][2421] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" HandleID="k8s-pod-network.dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" Workload="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0" Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.887 [INFO][2421] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.889 [INFO][2414] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" Dec 13 13:56:53.891632 env[1206]: time="2024-12-13T13:56:53.891592654Z" level=info msg="TearDown network for sandbox \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\" successfully" Dec 13 13:56:53.891724 env[1206]: time="2024-12-13T13:56:53.891706714Z" level=info msg="StopPodSandbox for \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\" returns successfully" Dec 13 13:56:53.892723 env[1206]: time="2024-12-13T13:56:53.892648740Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6tkwm,Uid:8da14905-625a-4f83-a34c-8ea13d6ed11a,Namespace:calico-system,Attempt:1,}" Dec 13 13:56:53.893085 systemd[1]: run-netns-cni\x2d34a12ba4\x2dc8fc\x2d0bdf\x2dfc00\x2d366615ad385a.mount: Deactivated successfully. Dec 13 13:56:54.037733 systemd-networkd[1035]: cali4755e8692dd: Link UP Dec 13 13:56:54.039483 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 13:56:54.039516 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4755e8692dd: link becomes ready Dec 13 13:56:54.039153 systemd-networkd[1035]: cali4755e8692dd: Gained carrier Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:53.961 [INFO][2428] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.19-k8s-csi--node--driver--6tkwm-eth0 csi-node-driver- calico-system 8da14905-625a-4f83-a34c-8ea13d6ed11a 1053 0 2024-12-13 13:56:30 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.0.0.19 csi-node-driver-6tkwm eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali4755e8692dd [] []}} ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Namespace="calico-system" Pod="csi-node-driver-6tkwm" WorkloadEndpoint="10.0.0.19-k8s-csi--node--driver--6tkwm-" Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:53.961 [INFO][2428] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Namespace="calico-system" Pod="csi-node-driver-6tkwm" WorkloadEndpoint="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0" Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:53.988 [INFO][2441] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" HandleID="k8s-pod-network.d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Workload="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0" Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.001 [INFO][2441] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" HandleID="k8s-pod-network.d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Workload="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d8d90), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.19", "pod":"csi-node-driver-6tkwm", "timestamp":"2024-12-13 13:56:53.988069108 +0000 UTC"}, Hostname:"10.0.0.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.001 [INFO][2441] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.001 [INFO][2441] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.001 [INFO][2441] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.19' Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.005 [INFO][2441] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" host="10.0.0.19" Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.010 [INFO][2441] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.19" Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.016 [INFO][2441] ipam/ipam.go 489: Trying affinity for 192.168.37.0/26 host="10.0.0.19" Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.018 [INFO][2441] ipam/ipam.go 155: Attempting to load block cidr=192.168.37.0/26 host="10.0.0.19" Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.021 [INFO][2441] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.37.0/26 host="10.0.0.19" Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.021 [INFO][2441] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.37.0/26 handle="k8s-pod-network.d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" host="10.0.0.19" Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.023 [INFO][2441] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.027 [INFO][2441] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.37.0/26 handle="k8s-pod-network.d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" host="10.0.0.19" Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.032 [INFO][2441] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.37.1/26] block=192.168.37.0/26 handle="k8s-pod-network.d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" host="10.0.0.19" Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.032 [INFO][2441] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.37.1/26] handle="k8s-pod-network.d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" host="10.0.0.19" Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.032 [INFO][2441] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.032 [INFO][2441] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.37.1/26] IPv6=[] ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" HandleID="k8s-pod-network.d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Workload="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0" Dec 13 13:56:54.051068 env[1206]: 2024-12-13 13:56:54.035 [INFO][2428] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Namespace="calico-system" Pod="csi-node-driver-6tkwm" WorkloadEndpoint="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.19-k8s-csi--node--driver--6tkwm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8da14905-625a-4f83-a34c-8ea13d6ed11a", ResourceVersion:"1053", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 56, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.19", ContainerID:"", Pod:"csi-node-driver-6tkwm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.37.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4755e8692dd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:56:54.051068 env[1206]: 2024-12-13 13:56:54.035 [INFO][2428] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.37.1/32] ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Namespace="calico-system" Pod="csi-node-driver-6tkwm" WorkloadEndpoint="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0" Dec 13 13:56:54.051068 env[1206]: 2024-12-13 13:56:54.035 [INFO][2428] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4755e8692dd ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Namespace="calico-system" Pod="csi-node-driver-6tkwm" WorkloadEndpoint="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0" Dec 13 13:56:54.051068 env[1206]: 2024-12-13 13:56:54.039 [INFO][2428] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Namespace="calico-system" Pod="csi-node-driver-6tkwm" WorkloadEndpoint="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0" Dec 13 13:56:54.051068 env[1206]: 2024-12-13 13:56:54.040 [INFO][2428] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Namespace="calico-system" Pod="csi-node-driver-6tkwm" WorkloadEndpoint="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.19-k8s-csi--node--driver--6tkwm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8da14905-625a-4f83-a34c-8ea13d6ed11a", ResourceVersion:"1053", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 56, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.19", ContainerID:"d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c", Pod:"csi-node-driver-6tkwm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.37.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4755e8692dd", MAC:"7a:da:b0:4f:97:09", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:56:54.051068 env[1206]: 2024-12-13 13:56:54.048 [INFO][2428] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Namespace="calico-system" Pod="csi-node-driver-6tkwm" WorkloadEndpoint="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0" Dec 13 13:56:54.058000 audit[2468]: NETFILTER_CFG table=filter:81 family=2 entries=34 op=nft_register_chain pid=2468 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:56:54.058000 audit[2468]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffd1c616f0 a2=0 a3=ffff9bcd5fa8 items=0 ppid=2115 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:54.058000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:56:54.062057 env[1206]: time="2024-12-13T13:56:54.061994526Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:56:54.062057 env[1206]: time="2024-12-13T13:56:54.062036347Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:56:54.062057 env[1206]: time="2024-12-13T13:56:54.062046742Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:56:54.062204 env[1206]: time="2024-12-13T13:56:54.062173764Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c pid=2472 runtime=io.containerd.runc.v2 Dec 13 13:56:54.075177 systemd[1]: Started cri-containerd-d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c.scope. Dec 13 13:56:54.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit: BPF prog-id=94 op=LOAD Dec 13 13:56:54.088000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[2481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2472 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:54.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432623539646133623062653061393563663937613361353665323239 Dec 13 13:56:54.088000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[2481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2472 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:54.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432623539646133623062653061393563663937613361353665323239 Dec 13 13:56:54.088000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.088000 audit: BPF prog-id=95 op=LOAD Dec 13 13:56:54.088000 audit[2481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2472 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:54.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432623539646133623062653061393563663937613361353665323239 Dec 13 13:56:54.089000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.089000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.089000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.089000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.089000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.089000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.089000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.089000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.089000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.089000 audit: BPF prog-id=96 op=LOAD Dec 13 13:56:54.089000 audit[2481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2472 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:54.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432623539646133623062653061393563663937613361353665323239 Dec 13 13:56:54.089000 audit: BPF prog-id=96 op=UNLOAD Dec 13 13:56:54.089000 audit: BPF prog-id=95 op=UNLOAD Dec 13 13:56:54.089000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.089000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.089000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.089000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.089000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.089000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.089000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.089000 audit[2481]: AVC avc: denied { perfmon } for pid=2481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.089000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.089000 audit[2481]: AVC avc: denied { bpf } for pid=2481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:54.089000 audit: BPF prog-id=97 op=LOAD Dec 13 13:56:54.089000 audit[2481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2472 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:54.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432623539646133623062653061393563663937613361353665323239 Dec 13 13:56:54.091902 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 13:56:54.101865 env[1206]: time="2024-12-13T13:56:54.101827652Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6tkwm,Uid:8da14905-625a-4f83-a34c-8ea13d6ed11a,Namespace:calico-system,Attempt:1,} returns sandbox id \"d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c\"" Dec 13 13:56:54.103386 env[1206]: time="2024-12-13T13:56:54.103357510Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 13:56:54.621219 kubelet[1452]: E1213 13:56:54.621164 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:55.029097 env[1206]: time="2024-12-13T13:56:55.028981928Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:55.030496 env[1206]: time="2024-12-13T13:56:55.030467143Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:55.032294 env[1206]: time="2024-12-13T13:56:55.032266769Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:55.033713 env[1206]: time="2024-12-13T13:56:55.033671780Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:55.034106 env[1206]: time="2024-12-13T13:56:55.034072795Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163\"" Dec 13 13:56:55.038457 env[1206]: time="2024-12-13T13:56:55.038413114Z" level=info msg="CreateContainer within sandbox \"d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 13:56:55.060014 env[1206]: time="2024-12-13T13:56:55.059945224Z" level=info msg="CreateContainer within sandbox \"d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"3cbe490d6f071b8e75e57d05ce5eb0d0aeb7f2b4ce5caa141d376a7ca370d09f\"" Dec 13 13:56:55.061189 env[1206]: time="2024-12-13T13:56:55.061161268Z" level=info msg="StartContainer for \"3cbe490d6f071b8e75e57d05ce5eb0d0aeb7f2b4ce5caa141d376a7ca370d09f\"" Dec 13 13:56:55.080948 systemd[1]: Started cri-containerd-3cbe490d6f071b8e75e57d05ce5eb0d0aeb7f2b4ce5caa141d376a7ca370d09f.scope. Dec 13 13:56:55.101000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.101000 audit[2513]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2472 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:55.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363626534393064366630373162386537356535376430356365356562 Dec 13 13:56:55.101000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.101000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.101000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.101000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.101000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.101000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.101000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.101000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.101000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.101000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.101000 audit: BPF prog-id=98 op=LOAD Dec 13 13:56:55.101000 audit[2513]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2472 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:55.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363626534393064366630373162386537356535376430356365356562 Dec 13 13:56:55.102000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.102000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.102000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.102000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.102000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.102000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.102000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.102000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.102000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.102000 audit: BPF prog-id=99 op=LOAD Dec 13 13:56:55.102000 audit[2513]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2472 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:55.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363626534393064366630373162386537356535376430356365356562 Dec 13 13:56:55.102000 audit: BPF prog-id=99 op=UNLOAD Dec 13 13:56:55.102000 audit: BPF prog-id=98 op=UNLOAD Dec 13 13:56:55.102000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.102000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.102000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.102000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.102000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.102000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.102000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.102000 audit[2513]: AVC avc: denied { perfmon } for pid=2513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.102000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.102000 audit[2513]: AVC avc: denied { bpf } for pid=2513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:55.102000 audit: BPF prog-id=100 op=LOAD Dec 13 13:56:55.102000 audit[2513]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2472 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:55.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363626534393064366630373162386537356535376430356365356562 Dec 13 13:56:55.171021 env[1206]: time="2024-12-13T13:56:55.170937215Z" level=info msg="StartContainer for \"3cbe490d6f071b8e75e57d05ce5eb0d0aeb7f2b4ce5caa141d376a7ca370d09f\" returns successfully" Dec 13 13:56:55.172452 env[1206]: time="2024-12-13T13:56:55.172417509Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 13:56:55.486463 systemd-networkd[1035]: cali4755e8692dd: Gained IPv6LL Dec 13 13:56:55.621772 kubelet[1452]: E1213 13:56:55.621727 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:55.772135 env[1206]: time="2024-12-13T13:56:55.771977020Z" level=info msg="StopPodSandbox for \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\"" Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.812 [INFO][2556] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.812 [INFO][2556] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" iface="eth0" netns="/var/run/netns/cni-4cedbaec-2560-e9ef-a77b-e9d873ef4e7f" Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.812 [INFO][2556] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" iface="eth0" netns="/var/run/netns/cni-4cedbaec-2560-e9ef-a77b-e9d873ef4e7f" Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.813 [INFO][2556] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" iface="eth0" netns="/var/run/netns/cni-4cedbaec-2560-e9ef-a77b-e9d873ef4e7f" Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.813 [INFO][2556] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.813 [INFO][2556] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.833 [INFO][2564] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" HandleID="k8s-pod-network.fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" Workload="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0" Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.833 [INFO][2564] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.833 [INFO][2564] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.842 [WARNING][2564] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" HandleID="k8s-pod-network.fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" Workload="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0" Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.842 [INFO][2564] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" HandleID="k8s-pod-network.fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" Workload="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0" Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.844 [INFO][2564] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.846 [INFO][2556] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" Dec 13 13:56:55.849355 env[1206]: time="2024-12-13T13:56:55.849117129Z" level=info msg="TearDown network for sandbox \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\" successfully" Dec 13 13:56:55.849355 env[1206]: time="2024-12-13T13:56:55.849144130Z" level=info msg="StopPodSandbox for \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\" returns successfully" Dec 13 13:56:55.849759 env[1206]: time="2024-12-13T13:56:55.849689630Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-f45xp,Uid:1646a1a4-8cfe-4cb8-8267-3eda01835546,Namespace:default,Attempt:1,}" Dec 13 13:56:55.850861 systemd[1]: run-netns-cni\x2d4cedbaec\x2d2560\x2de9ef\x2da77b\x2de9d873ef4e7f.mount: Deactivated successfully. Dec 13 13:56:55.951625 systemd-networkd[1035]: cali39b4e38866b: Link UP Dec 13 13:56:55.953374 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 13:56:55.953652 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali39b4e38866b: link becomes ready Dec 13 13:56:55.953520 systemd-networkd[1035]: cali39b4e38866b: Gained carrier Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.887 [INFO][2571] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0 nginx-deployment-85f456d6dd- default 1646a1a4-8cfe-4cb8-8267-3eda01835546 1065 0 2024-12-13 13:56:41 +0000 UTC map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.19 nginx-deployment-85f456d6dd-f45xp eth0 default [] [] [kns.default ksa.default.default] cali39b4e38866b [] []}} ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Namespace="default" Pod="nginx-deployment-85f456d6dd-f45xp" WorkloadEndpoint="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-" Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.888 [INFO][2571] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Namespace="default" Pod="nginx-deployment-85f456d6dd-f45xp" WorkloadEndpoint="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0" Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.911 [INFO][2584] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" HandleID="k8s-pod-network.b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Workload="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0" Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.923 [INFO][2584] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" HandleID="k8s-pod-network.b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Workload="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000305c80), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.19", "pod":"nginx-deployment-85f456d6dd-f45xp", "timestamp":"2024-12-13 13:56:55.911963034 +0000 UTC"}, Hostname:"10.0.0.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.923 [INFO][2584] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.923 [INFO][2584] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.923 [INFO][2584] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.19' Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.924 [INFO][2584] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" host="10.0.0.19" Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.928 [INFO][2584] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.19" Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.932 [INFO][2584] ipam/ipam.go 489: Trying affinity for 192.168.37.0/26 host="10.0.0.19" Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.934 [INFO][2584] ipam/ipam.go 155: Attempting to load block cidr=192.168.37.0/26 host="10.0.0.19" Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.936 [INFO][2584] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.37.0/26 host="10.0.0.19" Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.936 [INFO][2584] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.37.0/26 handle="k8s-pod-network.b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" host="10.0.0.19" Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.937 [INFO][2584] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.941 [INFO][2584] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.37.0/26 handle="k8s-pod-network.b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" host="10.0.0.19" Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.945 [INFO][2584] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.37.2/26] block=192.168.37.0/26 handle="k8s-pod-network.b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" host="10.0.0.19" Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.946 [INFO][2584] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.37.2/26] handle="k8s-pod-network.b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" host="10.0.0.19" Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.946 [INFO][2584] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.946 [INFO][2584] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.37.2/26] IPv6=[] ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" HandleID="k8s-pod-network.b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Workload="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0" Dec 13 13:56:55.964514 env[1206]: 2024-12-13 13:56:55.947 [INFO][2571] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Namespace="default" Pod="nginx-deployment-85f456d6dd-f45xp" WorkloadEndpoint="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"1646a1a4-8cfe-4cb8-8267-3eda01835546", ResourceVersion:"1065", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 56, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.19", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-f45xp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali39b4e38866b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:56:55.964514 env[1206]: 2024-12-13 13:56:55.947 [INFO][2571] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.37.2/32] ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Namespace="default" Pod="nginx-deployment-85f456d6dd-f45xp" WorkloadEndpoint="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0" Dec 13 13:56:55.964514 env[1206]: 2024-12-13 13:56:55.947 [INFO][2571] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali39b4e38866b ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Namespace="default" Pod="nginx-deployment-85f456d6dd-f45xp" WorkloadEndpoint="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0" Dec 13 13:56:55.964514 env[1206]: 2024-12-13 13:56:55.953 [INFO][2571] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Namespace="default" Pod="nginx-deployment-85f456d6dd-f45xp" WorkloadEndpoint="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0" Dec 13 13:56:55.964514 env[1206]: 2024-12-13 13:56:55.954 [INFO][2571] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Namespace="default" Pod="nginx-deployment-85f456d6dd-f45xp" WorkloadEndpoint="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"1646a1a4-8cfe-4cb8-8267-3eda01835546", ResourceVersion:"1065", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 56, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.19", ContainerID:"b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa", Pod:"nginx-deployment-85f456d6dd-f45xp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali39b4e38866b", MAC:"72:e9:61:19:d1:db", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:56:55.964514 env[1206]: 2024-12-13 13:56:55.961 [INFO][2571] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Namespace="default" Pod="nginx-deployment-85f456d6dd-f45xp" WorkloadEndpoint="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0" Dec 13 13:56:55.970000 audit[2606]: NETFILTER_CFG table=filter:82 family=2 entries=38 op=nft_register_chain pid=2606 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:56:55.970000 audit[2606]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20312 a0=3 a1=ffffd8f1bc60 a2=0 a3=ffffbe538fa8 items=0 ppid=2115 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:55.970000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:56:55.976512 env[1206]: time="2024-12-13T13:56:55.976441879Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:56:55.976512 env[1206]: time="2024-12-13T13:56:55.976481840Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:56:55.976512 env[1206]: time="2024-12-13T13:56:55.976492241Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:56:55.977304 env[1206]: time="2024-12-13T13:56:55.977233268Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa pid=2614 runtime=io.containerd.runc.v2 Dec 13 13:56:55.986820 systemd[1]: Started cri-containerd-b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa.scope. Dec 13 13:56:56.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit: BPF prog-id=101 op=LOAD Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2614 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:56.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235383363313761336530616261363834303237316164396265313631 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2614 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:56.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235383363313761336530616261363834303237316164396265313631 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit: BPF prog-id=102 op=LOAD Dec 13 13:56:56.011000 audit[2624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2614 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:56.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235383363313761336530616261363834303237316164396265313631 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit: BPF prog-id=103 op=LOAD Dec 13 13:56:56.011000 audit[2624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2614 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:56.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235383363313761336530616261363834303237316164396265313631 Dec 13 13:56:56.011000 audit: BPF prog-id=103 op=UNLOAD Dec 13 13:56:56.011000 audit: BPF prog-id=102 op=UNLOAD Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.011000 audit: BPF prog-id=104 op=LOAD Dec 13 13:56:56.011000 audit[2624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2614 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:56.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235383363313761336530616261363834303237316164396265313631 Dec 13 13:56:56.013328 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 13:56:56.029829 env[1206]: time="2024-12-13T13:56:56.029723895Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-f45xp,Uid:1646a1a4-8cfe-4cb8-8267-3eda01835546,Namespace:default,Attempt:1,} returns sandbox id \"b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa\"" Dec 13 13:56:56.276438 env[1206]: time="2024-12-13T13:56:56.276206153Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:56.279327 env[1206]: time="2024-12-13T13:56:56.279288500Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:56.280930 env[1206]: time="2024-12-13T13:56:56.280864235Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:56.282350 env[1206]: time="2024-12-13T13:56:56.282320165Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:56.282728 env[1206]: time="2024-12-13T13:56:56.282704378Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349\"" Dec 13 13:56:56.284489 env[1206]: time="2024-12-13T13:56:56.284466320Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 13:56:56.285295 env[1206]: time="2024-12-13T13:56:56.285268387Z" level=info msg="CreateContainer within sandbox \"d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 13:56:56.296277 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3714477386.mount: Deactivated successfully. Dec 13 13:56:56.300810 env[1206]: time="2024-12-13T13:56:56.300775524Z" level=info msg="CreateContainer within sandbox \"d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"4fc26163d4d4c3e06ebd1699b41d683a66d2e481df7c4948b8819a001667baf5\"" Dec 13 13:56:56.301617 env[1206]: time="2024-12-13T13:56:56.301592753Z" level=info msg="StartContainer for \"4fc26163d4d4c3e06ebd1699b41d683a66d2e481df7c4948b8819a001667baf5\"" Dec 13 13:56:56.319995 systemd[1]: Started cri-containerd-4fc26163d4d4c3e06ebd1699b41d683a66d2e481df7c4948b8819a001667baf5.scope. Dec 13 13:56:56.364000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.366467 kernel: kauditd_printk_skb: 171 callbacks suppressed Dec 13 13:56:56.366508 kernel: audit: type=1400 audit(1734098216.364:683): avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.368297 kernel: audit: type=1300 audit(1734098216.364:683): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2472 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:56.364000 audit[2655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2472 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:56.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633236313633643464346333653036656264313639396234316436 Dec 13 13:56:56.373327 kernel: audit: type=1327 audit(1734098216.364:683): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633236313633643464346333653036656264313639396234316436 Dec 13 13:56:56.373401 kernel: audit: type=1400 audit(1734098216.365:684): avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.376244 kernel: audit: type=1400 audit(1734098216.365:684): avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.378464 kernel: audit: type=1400 audit(1734098216.365:684): avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.381262 kernel: audit: type=1400 audit(1734098216.365:684): avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.381324 kernel: audit: type=1400 audit(1734098216.365:684): avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.387346 kernel: audit: type=1400 audit(1734098216.365:684): avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.387450 kernel: audit: type=1400 audit(1734098216.365:684): avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit: BPF prog-id=105 op=LOAD Dec 13 13:56:56.365000 audit[2655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2472 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:56.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633236313633643464346333653036656264313639396234316436 Dec 13 13:56:56.365000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.365000 audit: BPF prog-id=106 op=LOAD Dec 13 13:56:56.365000 audit[2655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2472 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:56.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633236313633643464346333653036656264313639396234316436 Dec 13 13:56:56.367000 audit: BPF prog-id=106 op=UNLOAD Dec 13 13:56:56.367000 audit: BPF prog-id=105 op=UNLOAD Dec 13 13:56:56.367000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.367000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.367000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.367000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.367000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.367000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.367000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.367000 audit[2655]: AVC avc: denied { perfmon } for pid=2655 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.367000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.367000 audit[2655]: AVC avc: denied { bpf } for pid=2655 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:56.367000 audit: BPF prog-id=107 op=LOAD Dec 13 13:56:56.367000 audit[2655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2472 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:56.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633236313633643464346333653036656264313639396234316436 Dec 13 13:56:56.392076 env[1206]: time="2024-12-13T13:56:56.392029726Z" level=info msg="StartContainer for \"4fc26163d4d4c3e06ebd1699b41d683a66d2e481df7c4948b8819a001667baf5\" returns successfully" Dec 13 13:56:56.622491 kubelet[1452]: E1213 13:56:56.622395 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:56.743289 kubelet[1452]: I1213 13:56:56.743205 1452 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 13:56:56.743289 kubelet[1452]: I1213 13:56:56.743261 1452 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 13:56:57.406558 systemd-networkd[1035]: cali39b4e38866b: Gained IPv6LL Dec 13 13:56:57.622724 kubelet[1452]: E1213 13:56:57.622662 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:58.408978 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1889477731.mount: Deactivated successfully. Dec 13 13:56:58.623026 kubelet[1452]: E1213 13:56:58.622958 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:59.583464 env[1206]: time="2024-12-13T13:56:59.583410304Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:59.584724 env[1206]: time="2024-12-13T13:56:59.584691541Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:59.586425 env[1206]: time="2024-12-13T13:56:59.586396991Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:59.588183 env[1206]: time="2024-12-13T13:56:59.588159523Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:56:59.588932 env[1206]: time="2024-12-13T13:56:59.588906504Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de\"" Dec 13 13:56:59.591269 env[1206]: time="2024-12-13T13:56:59.591225132Z" level=info msg="CreateContainer within sandbox \"b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Dec 13 13:56:59.600454 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2794459789.mount: Deactivated successfully. Dec 13 13:56:59.603156 env[1206]: time="2024-12-13T13:56:59.603107840Z" level=info msg="CreateContainer within sandbox \"b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"5e6dff8b12d068a380cb2af2b9fbad64eb650088df53ee49be16f82179caa8df\"" Dec 13 13:56:59.603860 env[1206]: time="2024-12-13T13:56:59.603828941Z" level=info msg="StartContainer for \"5e6dff8b12d068a380cb2af2b9fbad64eb650088df53ee49be16f82179caa8df\"" Dec 13 13:56:59.622102 systemd[1]: Started cri-containerd-5e6dff8b12d068a380cb2af2b9fbad64eb650088df53ee49be16f82179caa8df.scope. Dec 13 13:56:59.626143 kubelet[1452]: E1213 13:56:59.623809 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:56:59.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit: BPF prog-id=108 op=LOAD Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2614 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:59.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366466663862313264303638613338306362326166326239666261 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2614 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:59.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366466663862313264303638613338306362326166326239666261 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit: BPF prog-id=109 op=LOAD Dec 13 13:56:59.665000 audit[2701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2614 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:59.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366466663862313264303638613338306362326166326239666261 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit: BPF prog-id=110 op=LOAD Dec 13 13:56:59.665000 audit[2701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2614 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:59.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366466663862313264303638613338306362326166326239666261 Dec 13 13:56:59.665000 audit: BPF prog-id=110 op=UNLOAD Dec 13 13:56:59.665000 audit: BPF prog-id=109 op=UNLOAD Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:56:59.665000 audit: BPF prog-id=111 op=LOAD Dec 13 13:56:59.665000 audit[2701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2614 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:56:59.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366466663862313264303638613338306362326166326239666261 Dec 13 13:56:59.689246 env[1206]: time="2024-12-13T13:56:59.689189039Z" level=info msg="StartContainer for \"5e6dff8b12d068a380cb2af2b9fbad64eb650088df53ee49be16f82179caa8df\" returns successfully" Dec 13 13:56:59.848431 kubelet[1452]: I1213 13:56:59.848297 1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-f45xp" podStartSLOduration=15.29078103 podStartE2EDuration="18.848281414s" podCreationTimestamp="2024-12-13 13:56:41 +0000 UTC" firstStartedPulling="2024-12-13 13:56:56.032632836 +0000 UTC m=+26.184019082" lastFinishedPulling="2024-12-13 13:56:59.59013322 +0000 UTC m=+29.741519466" observedRunningTime="2024-12-13 13:56:59.848185891 +0000 UTC m=+29.999572137" watchObservedRunningTime="2024-12-13 13:56:59.848281414 +0000 UTC m=+29.999667660" Dec 13 13:56:59.848592 kubelet[1452]: I1213 13:56:59.848456 1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-6tkwm" podStartSLOduration=27.667800023 podStartE2EDuration="29.848451939s" podCreationTimestamp="2024-12-13 13:56:30 +0000 UTC" firstStartedPulling="2024-12-13 13:56:54.103119939 +0000 UTC m=+24.254506185" lastFinishedPulling="2024-12-13 13:56:56.283771855 +0000 UTC m=+26.435158101" observedRunningTime="2024-12-13 13:56:56.844925534 +0000 UTC m=+26.996311740" watchObservedRunningTime="2024-12-13 13:56:59.848451939 +0000 UTC m=+29.999838185" Dec 13 13:57:00.625941 kubelet[1452]: E1213 13:57:00.625877 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:01.626324 kubelet[1452]: E1213 13:57:01.626291 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:02.627350 kubelet[1452]: E1213 13:57:02.627309 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:03.628351 kubelet[1452]: E1213 13:57:03.628290 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:04.628741 kubelet[1452]: E1213 13:57:04.628695 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:05.038000 audit[2756]: NETFILTER_CFG table=filter:83 family=2 entries=20 op=nft_register_rule pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:57:05.042512 kernel: kauditd_printk_skb: 90 callbacks suppressed Dec 13 13:57:05.042602 kernel: audit: type=1325 audit(1734098225.038:707): table=filter:83 family=2 entries=20 op=nft_register_rule pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:57:05.042627 kernel: audit: type=1300 audit(1734098225.038:707): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff68df0f0 a2=0 a3=1 items=0 ppid=1607 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:05.038000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff68df0f0 a2=0 a3=1 items=0 ppid=1607 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:05.038000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:57:05.050138 kernel: audit: type=1327 audit(1734098225.038:707): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:57:05.056000 audit[2756]: NETFILTER_CFG table=nat:84 family=2 entries=22 op=nft_register_rule pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:57:05.056000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff68df0f0 a2=0 a3=1 items=0 ppid=1607 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:05.064466 kernel: audit: type=1325 audit(1734098225.056:708): table=nat:84 family=2 entries=22 op=nft_register_rule pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:57:05.064517 kernel: audit: type=1300 audit(1734098225.056:708): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff68df0f0 a2=0 a3=1 items=0 ppid=1607 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:05.064590 kernel: audit: type=1327 audit(1734098225.056:708): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:57:05.056000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:57:05.075000 audit[2759]: NETFILTER_CFG table=filter:85 family=2 entries=32 op=nft_register_rule pid=2759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:57:05.077175 kubelet[1452]: I1213 13:57:05.077120 1452 topology_manager.go:215] "Topology Admit Handler" podUID="303b0a19-ccfb-4310-a790-aa8bc0f35eca" podNamespace="default" podName="nfs-server-provisioner-0" Dec 13 13:57:05.075000 audit[2759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffeb98ca70 a2=0 a3=1 items=0 ppid=1607 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:05.081432 kernel: audit: type=1325 audit(1734098225.075:709): table=filter:85 family=2 entries=32 op=nft_register_rule pid=2759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:57:05.081488 kernel: audit: type=1300 audit(1734098225.075:709): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffeb98ca70 a2=0 a3=1 items=0 ppid=1607 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:05.081510 kernel: audit: type=1327 audit(1734098225.075:709): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:57:05.075000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:57:05.082014 systemd[1]: Created slice kubepods-besteffort-pod303b0a19_ccfb_4310_a790_aa8bc0f35eca.slice. Dec 13 13:57:05.083000 audit[2759]: NETFILTER_CFG table=nat:86 family=2 entries=22 op=nft_register_rule pid=2759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:57:05.083000 audit[2759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffeb98ca70 a2=0 a3=1 items=0 ppid=1607 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:05.083000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:57:05.087279 kernel: audit: type=1325 audit(1734098225.083:710): table=nat:86 family=2 entries=22 op=nft_register_rule pid=2759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:57:05.123338 kubelet[1452]: I1213 13:57:05.123292 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/303b0a19-ccfb-4310-a790-aa8bc0f35eca-data\") pod \"nfs-server-provisioner-0\" (UID: \"303b0a19-ccfb-4310-a790-aa8bc0f35eca\") " pod="default/nfs-server-provisioner-0" Dec 13 13:57:05.123338 kubelet[1452]: I1213 13:57:05.123340 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wl8vb\" (UniqueName: \"kubernetes.io/projected/303b0a19-ccfb-4310-a790-aa8bc0f35eca-kube-api-access-wl8vb\") pod \"nfs-server-provisioner-0\" (UID: \"303b0a19-ccfb-4310-a790-aa8bc0f35eca\") " pod="default/nfs-server-provisioner-0" Dec 13 13:57:05.385639 env[1206]: time="2024-12-13T13:57:05.385534264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:303b0a19-ccfb-4310-a790-aa8bc0f35eca,Namespace:default,Attempt:0,}" Dec 13 13:57:05.506591 systemd-networkd[1035]: cali60e51b789ff: Link UP Dec 13 13:57:05.507900 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 13:57:05.507972 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Dec 13 13:57:05.510859 systemd-networkd[1035]: cali60e51b789ff: Gained carrier Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.434 [INFO][2763] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.19-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 303b0a19-ccfb-4310-a790-aa8bc0f35eca 1122 0 2024-12-13 13:57:05 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.0.0.19 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.19-k8s-nfs--server--provisioner--0-" Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.434 [INFO][2763] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.457 [INFO][2776] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" HandleID="k8s-pod-network.10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Workload="10.0.0.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.471 [INFO][2776] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" HandleID="k8s-pod-network.10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Workload="10.0.0.19-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000431720), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.19", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 13:57:05.45761299 +0000 UTC"}, Hostname:"10.0.0.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.471 [INFO][2776] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.471 [INFO][2776] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.471 [INFO][2776] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.19' Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.474 [INFO][2776] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" host="10.0.0.19" Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.477 [INFO][2776] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.19" Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.485 [INFO][2776] ipam/ipam.go 489: Trying affinity for 192.168.37.0/26 host="10.0.0.19" Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.489 [INFO][2776] ipam/ipam.go 155: Attempting to load block cidr=192.168.37.0/26 host="10.0.0.19" Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.492 [INFO][2776] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.37.0/26 host="10.0.0.19" Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.492 [INFO][2776] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.37.0/26 handle="k8s-pod-network.10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" host="10.0.0.19" Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.493 [INFO][2776] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0 Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.497 [INFO][2776] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.37.0/26 handle="k8s-pod-network.10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" host="10.0.0.19" Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.502 [INFO][2776] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.37.3/26] block=192.168.37.0/26 handle="k8s-pod-network.10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" host="10.0.0.19" Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.502 [INFO][2776] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.37.3/26] handle="k8s-pod-network.10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" host="10.0.0.19" Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.502 [INFO][2776] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.502 [INFO][2776] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.37.3/26] IPv6=[] ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" HandleID="k8s-pod-network.10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Workload="10.0.0.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 13:57:05.519429 env[1206]: 2024-12-13 13:57:05.503 [INFO][2763] cni-plugin/k8s.go 386: Populated endpoint ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.19-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.19-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"303b0a19-ccfb-4310-a790-aa8bc0f35eca", ResourceVersion:"1122", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 57, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.19", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.37.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:57:05.519429 env[1206]: 2024-12-13 13:57:05.505 [INFO][2763] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.37.3/32] ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 13:57:05.519429 env[1206]: 2024-12-13 13:57:05.505 [INFO][2763] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 13:57:05.519429 env[1206]: 2024-12-13 13:57:05.508 [INFO][2763] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 13:57:05.519573 env[1206]: 2024-12-13 13:57:05.508 [INFO][2763] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.19-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.19-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"303b0a19-ccfb-4310-a790-aa8bc0f35eca", ResourceVersion:"1122", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 57, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.19", ContainerID:"10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.37.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"82:c8:c7:82:e6:7c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:57:05.519573 env[1206]: 2024-12-13 13:57:05.517 [INFO][2763] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.19-k8s-nfs--server--provisioner--0-eth0" Dec 13 13:57:05.535615 env[1206]: time="2024-12-13T13:57:05.535532040Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:57:05.535615 env[1206]: time="2024-12-13T13:57:05.535578761Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:57:05.535615 env[1206]: time="2024-12-13T13:57:05.535589201Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:57:05.538372 env[1206]: time="2024-12-13T13:57:05.538305539Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0 pid=2805 runtime=io.containerd.runc.v2 Dec 13 13:57:05.544000 audit[2819]: NETFILTER_CFG table=filter:87 family=2 entries=38 op=nft_register_chain pid=2819 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:57:05.544000 audit[2819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19820 a0=3 a1=ffffd981cfb0 a2=0 a3=ffffaf227fa8 items=0 ppid=2115 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:05.544000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:57:05.555054 systemd[1]: Started cri-containerd-10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0.scope. Dec 13 13:57:05.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.596000 audit: BPF prog-id=112 op=LOAD Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2805 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:05.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653966623466633235323366376439623830396333616630666565 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2805 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:05.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653966623466633235323366376439623830396333616630666565 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit: BPF prog-id=113 op=LOAD Dec 13 13:57:05.597000 audit[2817]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2805 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:05.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653966623466633235323366376439623830396333616630666565 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit: BPF prog-id=114 op=LOAD Dec 13 13:57:05.597000 audit[2817]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2805 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:05.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653966623466633235323366376439623830396333616630666565 Dec 13 13:57:05.597000 audit: BPF prog-id=114 op=UNLOAD Dec 13 13:57:05.597000 audit: BPF prog-id=113 op=UNLOAD Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { perfmon } for pid=2817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit[2817]: AVC avc: denied { bpf } for pid=2817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:05.597000 audit: BPF prog-id=115 op=LOAD Dec 13 13:57:05.597000 audit[2817]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2805 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:05.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653966623466633235323366376439623830396333616630666565 Dec 13 13:57:05.599158 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 13:57:05.621466 env[1206]: time="2024-12-13T13:57:05.621210734Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:303b0a19-ccfb-4310-a790-aa8bc0f35eca,Namespace:default,Attempt:0,} returns sandbox id \"10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0\"" Dec 13 13:57:05.622981 env[1206]: time="2024-12-13T13:57:05.622951571Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Dec 13 13:57:05.629096 kubelet[1452]: E1213 13:57:05.629060 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:06.629912 kubelet[1452]: E1213 13:57:06.629868 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:07.198611 systemd-networkd[1035]: cali60e51b789ff: Gained IPv6LL Dec 13 13:57:07.631127 kubelet[1452]: E1213 13:57:07.631004 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:07.698455 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4018416669.mount: Deactivated successfully. Dec 13 13:57:08.008176 update_engine[1197]: I1213 13:57:08.008056 1197 update_attempter.cc:509] Updating boot flags... Dec 13 13:57:08.631930 kubelet[1452]: E1213 13:57:08.631878 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:09.486872 env[1206]: time="2024-12-13T13:57:09.486821428Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:09.490022 env[1206]: time="2024-12-13T13:57:09.489994043Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:09.491681 env[1206]: time="2024-12-13T13:57:09.491642671Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:09.493207 env[1206]: time="2024-12-13T13:57:09.493183778Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:09.494659 env[1206]: time="2024-12-13T13:57:09.494621963Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Dec 13 13:57:09.496648 env[1206]: time="2024-12-13T13:57:09.496610357Z" level=info msg="CreateContainer within sandbox \"10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Dec 13 13:57:09.504957 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3711632019.mount: Deactivated successfully. Dec 13 13:57:09.508323 env[1206]: time="2024-12-13T13:57:09.508222718Z" level=info msg="CreateContainer within sandbox \"10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"f6ae0729dea5a71586cc876c7049fda45854854912adcc3a5bb1398d9cedd843\"" Dec 13 13:57:09.508773 env[1206]: time="2024-12-13T13:57:09.508749087Z" level=info msg="StartContainer for \"f6ae0729dea5a71586cc876c7049fda45854854912adcc3a5bb1398d9cedd843\"" Dec 13 13:57:09.526598 systemd[1]: Started cri-containerd-f6ae0729dea5a71586cc876c7049fda45854854912adcc3a5bb1398d9cedd843.scope. Dec 13 13:57:09.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.575000 audit: BPF prog-id=116 op=LOAD Dec 13 13:57:09.575000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.575000 audit[2870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2805 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:09.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636616530373239646561356137313538366363383736633730343966 Dec 13 13:57:09.576000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.576000 audit[2870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2805 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:09.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636616530373239646561356137313538366363383736633730343966 Dec 13 13:57:09.576000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.576000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.576000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.576000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.576000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.576000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.576000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.576000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.576000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.576000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.576000 audit: BPF prog-id=117 op=LOAD Dec 13 13:57:09.576000 audit[2870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2805 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:09.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636616530373239646561356137313538366363383736633730343966 Dec 13 13:57:09.577000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.577000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.577000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.577000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.577000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.577000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.577000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.577000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.577000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.577000 audit: BPF prog-id=118 op=LOAD Dec 13 13:57:09.577000 audit[2870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2805 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:09.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636616530373239646561356137313538366363383736633730343966 Dec 13 13:57:09.577000 audit: BPF prog-id=118 op=UNLOAD Dec 13 13:57:09.577000 audit: BPF prog-id=117 op=UNLOAD Dec 13 13:57:09.577000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.577000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.577000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.577000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.577000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.577000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.577000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.577000 audit[2870]: AVC avc: denied { perfmon } for pid=2870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.577000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.577000 audit[2870]: AVC avc: denied { bpf } for pid=2870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:09.577000 audit: BPF prog-id=119 op=LOAD Dec 13 13:57:09.577000 audit[2870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2805 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:09.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636616530373239646561356137313538366363383736633730343966 Dec 13 13:57:09.593688 env[1206]: time="2024-12-13T13:57:09.593640234Z" level=info msg="StartContainer for \"f6ae0729dea5a71586cc876c7049fda45854854912adcc3a5bb1398d9cedd843\" returns successfully" Dec 13 13:57:09.632120 kubelet[1452]: E1213 13:57:09.632083 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:09.678000 audit[2899]: AVC avc: denied { search } for pid=2899 comm="rpcbind" name="crypto" dev="proc" ino=16980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 13:57:09.678000 audit[2899]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8a23f000 a2=0 a3=0 items=0 ppid=2880 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 key=(null) Dec 13 13:57:09.678000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Dec 13 13:57:09.725000 audit[2904]: AVC avc: denied { search } for pid=2904 comm="dbus-daemon" name="crypto" dev="proc" ino=16980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 13:57:09.725000 audit[2904]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffae6cf000 a2=0 a3=0 items=0 ppid=2880 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 key=(null) Dec 13 13:57:09.725000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 13:57:09.732000 audit[2905]: AVC avc: denied { watch } for pid=2905 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537183 scontext=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c75,c144 tclass=dir permissive=0 Dec 13 13:57:09.732000 audit[2905]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaaf27c3a40 a2=2c8 a3=aaaaf27a8a60 items=0 ppid=2880 pid=2905 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 key=(null) Dec 13 13:57:09.732000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Dec 13 13:57:09.737000 audit[2906]: AVC avc: denied { read } for pid=2906 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=17891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Dec 13 13:57:09.737000 audit[2906]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffff8d5ea570 a2=80000 a3=0 items=0 ppid=2880 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 key=(null) Dec 13 13:57:09.737000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 13:57:09.738000 audit[2906]: AVC avc: denied { search } for pid=2906 comm="ganesha.nfsd" name="crypto" dev="proc" ino=16980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Dec 13 13:57:09.738000 audit[2906]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8c97f000 a2=0 a3=0 items=0 ppid=2880 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 key=(null) Dec 13 13:57:09.738000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Dec 13 13:57:09.888000 audit[2927]: NETFILTER_CFG table=filter:88 family=2 entries=20 op=nft_register_rule pid=2927 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:57:09.888000 audit[2927]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc7c7b720 a2=0 a3=1 items=0 ppid=1607 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:09.888000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:57:09.901000 audit[2927]: NETFILTER_CFG table=nat:89 family=2 entries=106 op=nft_register_chain pid=2927 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 13:57:09.901000 audit[2927]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffc7c7b720 a2=0 a3=1 items=0 ppid=1607 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:09.901000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 13:57:10.604489 kubelet[1452]: E1213 13:57:10.604449 1452 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:10.632785 kubelet[1452]: E1213 13:57:10.632746 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:11.633095 kubelet[1452]: E1213 13:57:11.633056 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:12.633937 kubelet[1452]: E1213 13:57:12.633894 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:13.634256 kubelet[1452]: E1213 13:57:13.634198 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:14.635749 kubelet[1452]: E1213 13:57:14.635704 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:15.636429 kubelet[1452]: E1213 13:57:15.636380 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:16.637088 kubelet[1452]: E1213 13:57:16.637048 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:17.463757 kubelet[1452]: E1213 13:57:17.463711 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 13:57:17.478479 kubelet[1452]: I1213 13:57:17.477852 1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=8.605268463 podStartE2EDuration="12.477829511s" podCreationTimestamp="2024-12-13 13:57:05 +0000 UTC" firstStartedPulling="2024-12-13 13:57:05.622664765 +0000 UTC m=+35.774051011" lastFinishedPulling="2024-12-13 13:57:09.495225813 +0000 UTC m=+39.646612059" observedRunningTime="2024-12-13 13:57:09.877114654 +0000 UTC m=+40.028500900" watchObservedRunningTime="2024-12-13 13:57:17.477829511 +0000 UTC m=+47.629215757" Dec 13 13:57:17.638161 kubelet[1452]: E1213 13:57:17.638129 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:18.639215 kubelet[1452]: E1213 13:57:18.639180 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:19.015132 kubelet[1452]: I1213 13:57:19.015092 1452 topology_manager.go:215] "Topology Admit Handler" podUID="e9eb12d9-2578-4d31-b341-7371387e6d47" podNamespace="default" podName="test-pod-1" Dec 13 13:57:19.020603 systemd[1]: Created slice kubepods-besteffort-pode9eb12d9_2578_4d31_b341_7371387e6d47.slice. Dec 13 13:57:19.196393 kubelet[1452]: I1213 13:57:19.196346 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-3f4e66f3-3040-40a1-89fc-d1a1b861b491\" (UniqueName: \"kubernetes.io/nfs/e9eb12d9-2578-4d31-b341-7371387e6d47-pvc-3f4e66f3-3040-40a1-89fc-d1a1b861b491\") pod \"test-pod-1\" (UID: \"e9eb12d9-2578-4d31-b341-7371387e6d47\") " pod="default/test-pod-1" Dec 13 13:57:19.196548 kubelet[1452]: I1213 13:57:19.196401 1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ll5hz\" (UniqueName: \"kubernetes.io/projected/e9eb12d9-2578-4d31-b341-7371387e6d47-kube-api-access-ll5hz\") pod \"test-pod-1\" (UID: \"e9eb12d9-2578-4d31-b341-7371387e6d47\") " pod="default/test-pod-1" Dec 13 13:57:19.306000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.311273 kernel: Failed to create system directory netfs Dec 13 13:57:19.311314 kernel: Failed to create system directory netfs Dec 13 13:57:19.311340 kernel: kauditd_printk_skb: 140 callbacks suppressed Dec 13 13:57:19.311374 kernel: audit: type=1400 audit(1734098239.306:755): avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.313724 kernel: Failed to create system directory netfs Dec 13 13:57:19.313858 kernel: audit: type=1400 audit(1734098239.306:755): avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.306000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.316192 kernel: Failed to create system directory netfs Dec 13 13:57:19.316233 kernel: audit: type=1400 audit(1734098239.306:755): avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.306000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.306000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.320724 kernel: audit: type=1400 audit(1734098239.306:755): avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.320781 kernel: audit: type=1300 audit(1734098239.306:755): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab037785e0 a1=12c14 a2=aaaae373e028 a3=aaab03769010 items=0 ppid=9 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:19.306000 audit[2958]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab037785e0 a1=12c14 a2=aaaae373e028 a3=aaab03769010 items=0 ppid=9 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:19.323443 kernel: audit: type=1327 audit(1734098239.306:755): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 13:57:19.306000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 13:57:19.322000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.328697 kernel: Failed to create system directory fscache Dec 13 13:57:19.328750 kernel: audit: type=1400 audit(1734098239.322:756): avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.328783 kernel: Failed to create system directory fscache Dec 13 13:57:19.328799 kernel: audit: type=1400 audit(1734098239.322:756): avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.322000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.331058 kernel: Failed to create system directory fscache Dec 13 13:57:19.331118 kernel: audit: type=1400 audit(1734098239.322:756): avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.322000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.331473 kernel: Failed to create system directory fscache Dec 13 13:57:19.333404 kernel: audit: type=1400 audit(1734098239.322:756): avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.322000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.335793 kernel: Failed to create system directory fscache Dec 13 13:57:19.322000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.322000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.336275 kernel: Failed to create system directory fscache Dec 13 13:57:19.336560 kernel: Failed to create system directory fscache Dec 13 13:57:19.322000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.322000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.337428 kernel: Failed to create system directory fscache Dec 13 13:57:19.337467 kernel: Failed to create system directory fscache Dec 13 13:57:19.322000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.322000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.338345 kernel: Failed to create system directory fscache Dec 13 13:57:19.338402 kernel: Failed to create system directory fscache Dec 13 13:57:19.322000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.322000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.322000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.339523 kernel: Failed to create system directory fscache Dec 13 13:57:19.339551 kernel: Failed to create system directory fscache Dec 13 13:57:19.339575 kernel: Failed to create system directory fscache Dec 13 13:57:19.322000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.340655 kernel: FS-Cache: Loaded Dec 13 13:57:19.322000 audit[2958]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0398b210 a1=4c344 a2=aaaae373e028 a3=aaab03769010 items=0 ppid=9 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:19.322000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.362567 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.362608 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.362627 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.362642 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.363397 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.363443 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.364656 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.364703 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.364718 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.365488 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.365530 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.366308 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.366363 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.367549 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.367585 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.367600 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.368382 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.368431 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.370116 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.370168 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.370198 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.370224 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.370502 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.371298 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.371354 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.372554 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.372584 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.372600 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.373382 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.373426 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.374650 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.374680 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.374697 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.375486 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.375517 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.376303 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.376341 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.377540 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.377575 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.377589 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.378389 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.378424 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.379643 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.379669 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.379693 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.380481 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.380515 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.381301 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.381328 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.382551 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.382583 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.382598 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.383384 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.383405 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.384635 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.384660 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.384679 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.385473 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.385496 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.386296 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.386323 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.387549 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.387572 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.387586 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.388383 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.388406 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.389636 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.389664 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.389678 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.390478 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.390507 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.391309 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.391334 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.392560 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.392588 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.392603 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.393394 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.393417 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.394647 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.394664 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.394686 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.395485 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.395512 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.396312 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.396350 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.397572 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.397597 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.397619 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.398405 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.398426 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.399268 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.399292 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.400534 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.400570 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.400593 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.401365 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.401394 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.402613 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.402642 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.402661 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.403456 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.403505 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.404302 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.404323 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.405571 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.405596 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.405621 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.406403 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.406427 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.407659 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.407681 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.407695 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.408502 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.408524 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.409328 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.409351 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.410590 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.410631 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.410661 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.411415 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.411437 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.412665 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.412688 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.412702 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.413537 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.413571 kernel: Failed to create system directory sunrpc Dec 13 13:57:19.354000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.423686 kernel: RPC: Registered named UNIX socket transport module. Dec 13 13:57:19.423834 kernel: RPC: Registered udp transport module. Dec 13 13:57:19.423865 kernel: RPC: Registered tcp transport module. Dec 13 13:57:19.423895 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Dec 13 13:57:19.354000 audit[2958]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab039d7560 a1=14a504 a2=aaaae373e028 a3=aaab03769010 items=6 ppid=9 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:19.354000 audit: CWD cwd="/" Dec 13 13:57:19.354000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:57:19.354000 audit: PATH item=1 name=(null) inode=18091 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:57:19.354000 audit: PATH item=2 name=(null) inode=18091 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:57:19.354000 audit: PATH item=3 name=(null) inode=18092 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:57:19.354000 audit: PATH item=4 name=(null) inode=18091 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:57:19.354000 audit: PATH item=5 name=(null) inode=18093 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 13:57:19.354000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.450391 kernel: Failed to create system directory nfs Dec 13 13:57:19.450440 kernel: Failed to create system directory nfs Dec 13 13:57:19.450455 kernel: Failed to create system directory nfs Dec 13 13:57:19.450468 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.451523 kernel: Failed to create system directory nfs Dec 13 13:57:19.451544 kernel: Failed to create system directory nfs Dec 13 13:57:19.451563 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.452306 kernel: Failed to create system directory nfs Dec 13 13:57:19.452326 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.453495 kernel: Failed to create system directory nfs Dec 13 13:57:19.453515 kernel: Failed to create system directory nfs Dec 13 13:57:19.453532 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.454272 kernel: Failed to create system directory nfs Dec 13 13:57:19.454299 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.455456 kernel: Failed to create system directory nfs Dec 13 13:57:19.455480 kernel: Failed to create system directory nfs Dec 13 13:57:19.455498 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.456246 kernel: Failed to create system directory nfs Dec 13 13:57:19.456267 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.457417 kernel: Failed to create system directory nfs Dec 13 13:57:19.457445 kernel: Failed to create system directory nfs Dec 13 13:57:19.457464 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.458602 kernel: Failed to create system directory nfs Dec 13 13:57:19.458624 kernel: Failed to create system directory nfs Dec 13 13:57:19.458637 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.459394 kernel: Failed to create system directory nfs Dec 13 13:57:19.459416 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.460591 kernel: Failed to create system directory nfs Dec 13 13:57:19.460610 kernel: Failed to create system directory nfs Dec 13 13:57:19.460633 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.461381 kernel: Failed to create system directory nfs Dec 13 13:57:19.461411 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.462569 kernel: Failed to create system directory nfs Dec 13 13:57:19.462588 kernel: Failed to create system directory nfs Dec 13 13:57:19.462605 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.463360 kernel: Failed to create system directory nfs Dec 13 13:57:19.463382 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.464552 kernel: Failed to create system directory nfs Dec 13 13:57:19.464574 kernel: Failed to create system directory nfs Dec 13 13:57:19.464588 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.465343 kernel: Failed to create system directory nfs Dec 13 13:57:19.465366 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.466529 kernel: Failed to create system directory nfs Dec 13 13:57:19.466558 kernel: Failed to create system directory nfs Dec 13 13:57:19.466574 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.467314 kernel: Failed to create system directory nfs Dec 13 13:57:19.467345 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.468525 kernel: Failed to create system directory nfs Dec 13 13:57:19.468544 kernel: Failed to create system directory nfs Dec 13 13:57:19.468562 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.469309 kernel: Failed to create system directory nfs Dec 13 13:57:19.469328 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.470508 kernel: Failed to create system directory nfs Dec 13 13:57:19.470530 kernel: Failed to create system directory nfs Dec 13 13:57:19.470586 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.471289 kernel: Failed to create system directory nfs Dec 13 13:57:19.471306 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.472466 kernel: Failed to create system directory nfs Dec 13 13:57:19.472521 kernel: Failed to create system directory nfs Dec 13 13:57:19.472541 kernel: Failed to create system directory nfs Dec 13 13:57:19.443000 audit[2958]: AVC avc: denied { confidentiality } for pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.487266 kernel: FS-Cache: Netfs 'nfs' registered for caching Dec 13 13:57:19.443000 audit[2958]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab03b806f0 a1=116204 a2=aaaae373e028 a3=aaab03769010 items=0 ppid=9 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:19.443000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.515281 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.515307 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.515320 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.515420 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.516506 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.516548 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.516567 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.517303 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.517368 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.518520 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.518548 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.518562 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.519323 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.519384 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.520538 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.520595 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.520615 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.521342 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.521397 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.522548 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.522602 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.522624 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.523349 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.523376 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.524560 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.524621 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.524641 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.525361 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.525378 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.526567 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.526585 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.526611 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.527369 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.527386 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.528613 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.528638 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.528652 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.529453 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.529524 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.530642 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.530678 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.530696 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.531450 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.531495 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.532243 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.532289 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.533449 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.533496 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.533516 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.534250 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.534284 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.535457 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.535523 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.535554 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.536280 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.536321 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.537482 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.537505 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.537518 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.538246 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.538286 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.539472 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.539502 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.539528 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.540301 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.540350 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.541504 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.541526 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.541539 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.542295 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.542322 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.543500 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.543522 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.543536 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.544289 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.544317 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.545496 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.545524 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.545539 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.546306 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.546349 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.547516 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.547558 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.547573 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.548250 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.548275 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.549498 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.549523 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.549538 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.550252 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.550273 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.551468 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.551531 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.551557 kernel: Failed to create system directory nfs4 Dec 13 13:57:19.506000 audit[2964]: AVC avc: denied { confidentiality } for pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.640651 kubelet[1452]: E1213 13:57:19.640520 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:19.651540 kernel: NFS: Registering the id_resolver key type Dec 13 13:57:19.651608 kernel: Key type id_resolver registered Dec 13 13:57:19.651629 kernel: Key type id_legacy registered Dec 13 13:57:19.506000 audit[2964]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff976ba010 a1=19c49c a2=aaaae355e028 a3=aaaaffbc0010 items=0 ppid=9 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:19.506000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.665339 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.665371 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.665396 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.666578 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.666603 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.666618 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.667412 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.667435 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.668670 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.668693 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.668706 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.669517 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.669544 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.670343 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.670380 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.671572 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.671596 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.671609 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.672402 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.672426 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.673654 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.673692 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.673706 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.674512 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.674558 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.661000 audit[2965]: AVC avc: denied { confidentiality } for pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 13:57:19.675316 kernel: Failed to create system directory rpcgss Dec 13 13:57:19.661000 audit[2965]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffa8c62010 a1=5ee04 a2=aaaae304e028 a3=aaaae71d7010 items=0 ppid=9 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:19.661000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Dec 13 13:57:19.689241 nfsidmap[2973]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 13:57:19.691998 nfsidmap[2976]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain' Dec 13 13:57:19.713000 audit[1274]: AVC avc: denied { watch_reads } for pid=1274 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2447 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 13:57:19.713000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2447 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 13:57:19.713000 audit[1274]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab228984d0 a2=10 a3=0 items=0 ppid=1 pid=1274 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:19.713000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2447 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 13:57:19.713000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2447 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 13:57:19.713000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 13:57:19.713000 audit[1274]: AVC avc: denied { watch_reads } for pid=1274 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2447 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 13:57:19.713000 audit[1274]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab228984d0 a2=10 a3=0 items=0 ppid=1 pid=1274 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:19.713000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 13:57:19.713000 audit[1274]: AVC avc: denied { watch_reads } for pid=1274 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2447 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Dec 13 13:57:19.713000 audit[1274]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab228984d0 a2=10 a3=0 items=0 ppid=1 pid=1274 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:19.713000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Dec 13 13:57:19.923721 env[1206]: time="2024-12-13T13:57:19.923615068Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e9eb12d9-2578-4d31-b341-7371387e6d47,Namespace:default,Attempt:0,}" Dec 13 13:57:20.041252 systemd-networkd[1035]: cali5ec59c6bf6e: Link UP Dec 13 13:57:20.042755 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 13:57:20.042839 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Dec 13 13:57:20.042894 systemd-networkd[1035]: cali5ec59c6bf6e: Gained carrier Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:19.968 [INFO][2979] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.19-k8s-test--pod--1-eth0 default e9eb12d9-2578-4d31-b341-7371387e6d47 1183 0 2024-12-13 13:57:05 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.0.0.19 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.19-k8s-test--pod--1-" Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:19.969 [INFO][2979] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.19-k8s-test--pod--1-eth0" Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:19.992 [INFO][2994] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" HandleID="k8s-pod-network.08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Workload="10.0.0.19-k8s-test--pod--1-eth0" Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.005 [INFO][2994] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" HandleID="k8s-pod-network.08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Workload="10.0.0.19-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003993e0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.19", "pod":"test-pod-1", "timestamp":"2024-12-13 13:57:19.992582906 +0000 UTC"}, Hostname:"10.0.0.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.005 [INFO][2994] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.005 [INFO][2994] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.005 [INFO][2994] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.19' Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.007 [INFO][2994] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" host="10.0.0.19" Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.012 [INFO][2994] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.19" Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.020 [INFO][2994] ipam/ipam.go 489: Trying affinity for 192.168.37.0/26 host="10.0.0.19" Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.023 [INFO][2994] ipam/ipam.go 155: Attempting to load block cidr=192.168.37.0/26 host="10.0.0.19" Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.026 [INFO][2994] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.37.0/26 host="10.0.0.19" Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.026 [INFO][2994] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.37.0/26 handle="k8s-pod-network.08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" host="10.0.0.19" Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.028 [INFO][2994] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9 Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.032 [INFO][2994] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.37.0/26 handle="k8s-pod-network.08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" host="10.0.0.19" Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.037 [INFO][2994] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.37.4/26] block=192.168.37.0/26 handle="k8s-pod-network.08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" host="10.0.0.19" Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.037 [INFO][2994] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.37.4/26] handle="k8s-pod-network.08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" host="10.0.0.19" Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.037 [INFO][2994] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.037 [INFO][2994] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.37.4/26] IPv6=[] ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" HandleID="k8s-pod-network.08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Workload="10.0.0.19-k8s-test--pod--1-eth0" Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.039 [INFO][2979] cni-plugin/k8s.go 386: Populated endpoint ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.19-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.19-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e9eb12d9-2578-4d31-b341-7371387e6d47", ResourceVersion:"1183", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 57, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.19", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:57:20.054465 env[1206]: 2024-12-13 13:57:20.039 [INFO][2979] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.37.4/32] ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.19-k8s-test--pod--1-eth0" Dec 13 13:57:20.054465 env[1206]: 2024-12-13 13:57:20.039 [INFO][2979] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.19-k8s-test--pod--1-eth0" Dec 13 13:57:20.054465 env[1206]: 2024-12-13 13:57:20.043 [INFO][2979] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.19-k8s-test--pod--1-eth0" Dec 13 13:57:20.054465 env[1206]: 2024-12-13 13:57:20.043 [INFO][2979] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.19-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.19-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e9eb12d9-2578-4d31-b341-7371387e6d47", ResourceVersion:"1183", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 57, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.19", ContainerID:"08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"d6:8e:54:66:74:c7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 13:57:20.054465 env[1206]: 2024-12-13 13:57:20.052 [INFO][2979] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.19-k8s-test--pod--1-eth0" Dec 13 13:57:20.060000 audit[3015]: NETFILTER_CFG table=filter:90 family=2 entries=38 op=nft_register_chain pid=3015 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 13:57:20.060000 audit[3015]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19400 a0=3 a1=ffffd6cf2e80 a2=0 a3=ffff8704bfa8 items=0 ppid=2115 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:20.060000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 13:57:20.064660 env[1206]: time="2024-12-13T13:57:20.064571551Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 13:57:20.064660 env[1206]: time="2024-12-13T13:57:20.064614511Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 13:57:20.064660 env[1206]: time="2024-12-13T13:57:20.064624992Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 13:57:20.064977 env[1206]: time="2024-12-13T13:57:20.064937795Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9 pid=3024 runtime=io.containerd.runc.v2 Dec 13 13:57:20.075555 systemd[1]: Started cri-containerd-08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9.scope. Dec 13 13:57:20.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit: BPF prog-id=120 op=LOAD Dec 13 13:57:20.112000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3024 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:20.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038646231373532366336316531336330353531383364346136653762 Dec 13 13:57:20.112000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3024 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:20.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038646231373532366336316531336330353531383364346136653762 Dec 13 13:57:20.112000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.112000 audit: BPF prog-id=121 op=LOAD Dec 13 13:57:20.112000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3024 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:20.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038646231373532366336316531336330353531383364346136653762 Dec 13 13:57:20.113000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.113000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.113000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.113000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.113000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.113000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.113000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.113000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.113000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.113000 audit: BPF prog-id=122 op=LOAD Dec 13 13:57:20.113000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3024 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:20.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038646231373532366336316531336330353531383364346136653762 Dec 13 13:57:20.113000 audit: BPF prog-id=122 op=UNLOAD Dec 13 13:57:20.113000 audit: BPF prog-id=121 op=UNLOAD Dec 13 13:57:20.113000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.113000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.113000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.113000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.113000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.113000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.113000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.113000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.113000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.113000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.113000 audit: BPF prog-id=123 op=LOAD Dec 13 13:57:20.113000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3024 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:20.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038646231373532366336316531336330353531383364346136653762 Dec 13 13:57:20.115283 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 13:57:20.134495 env[1206]: time="2024-12-13T13:57:20.134446330Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e9eb12d9-2578-4d31-b341-7371387e6d47,Namespace:default,Attempt:0,} returns sandbox id \"08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9\"" Dec 13 13:57:20.136029 env[1206]: time="2024-12-13T13:57:20.135938185Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Dec 13 13:57:20.412362 env[1206]: time="2024-12-13T13:57:20.412290706Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:20.414796 env[1206]: time="2024-12-13T13:57:20.414757172Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:20.416284 env[1206]: time="2024-12-13T13:57:20.416225108Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:20.419095 env[1206]: time="2024-12-13T13:57:20.419052898Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 13:57:20.419398 env[1206]: time="2024-12-13T13:57:20.419374901Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de\"" Dec 13 13:57:20.421941 env[1206]: time="2024-12-13T13:57:20.421909888Z" level=info msg="CreateContainer within sandbox \"08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9\" for container &ContainerMetadata{Name:test,Attempt:0,}" Dec 13 13:57:20.442313 env[1206]: time="2024-12-13T13:57:20.442258423Z" level=info msg="CreateContainer within sandbox \"08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"964f8048d6bdadecca954cecf68ce5601a0eea1fe81cabc2bfcb8a555f63ee48\"" Dec 13 13:57:20.442762 env[1206]: time="2024-12-13T13:57:20.442736348Z" level=info msg="StartContainer for \"964f8048d6bdadecca954cecf68ce5601a0eea1fe81cabc2bfcb8a555f63ee48\"" Dec 13 13:57:20.461931 systemd[1]: Started cri-containerd-964f8048d6bdadecca954cecf68ce5601a0eea1fe81cabc2bfcb8a555f63ee48.scope. Dec 13 13:57:20.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.493000 audit: BPF prog-id=124 op=LOAD Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3024 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:20.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936346638303438643662646164656363613935346365636636386365 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3024 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:20.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936346638303438643662646164656363613935346365636636386365 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit: BPF prog-id=125 op=LOAD Dec 13 13:57:20.494000 audit[3066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3024 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:20.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936346638303438643662646164656363613935346365636636386365 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit: BPF prog-id=126 op=LOAD Dec 13 13:57:20.494000 audit[3066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3024 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:20.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936346638303438643662646164656363613935346365636636386365 Dec 13 13:57:20.494000 audit: BPF prog-id=126 op=UNLOAD Dec 13 13:57:20.494000 audit: BPF prog-id=125 op=UNLOAD Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { perfmon } for pid=3066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit[3066]: AVC avc: denied { bpf } for pid=3066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 13:57:20.494000 audit: BPF prog-id=127 op=LOAD Dec 13 13:57:20.494000 audit[3066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3024 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 13:57:20.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936346638303438643662646164656363613935346365636636386365 Dec 13 13:57:20.512220 env[1206]: time="2024-12-13T13:57:20.512160842Z" level=info msg="StartContainer for \"964f8048d6bdadecca954cecf68ce5601a0eea1fe81cabc2bfcb8a555f63ee48\" returns successfully" Dec 13 13:57:20.640965 kubelet[1452]: E1213 13:57:20.640908 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:21.214434 systemd-networkd[1035]: cali5ec59c6bf6e: Gained IPv6LL Dec 13 13:57:21.310355 systemd[1]: run-containerd-runc-k8s.io-964f8048d6bdadecca954cecf68ce5601a0eea1fe81cabc2bfcb8a555f63ee48-runc.5wzO8K.mount: Deactivated successfully. Dec 13 13:57:21.641251 kubelet[1452]: E1213 13:57:21.641186 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Dec 13 13:57:22.641866 kubelet[1452]: E1213 13:57:22.641811 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"