Dec 13 13:56:15.727420 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1]
Dec 13 13:56:15.727443 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Dec 13 12:58:58 -00 2024
Dec 13 13:56:15.727451 kernel: efi: EFI v2.70 by EDK II
Dec 13 13:56:15.727457 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 
Dec 13 13:56:15.727462 kernel: random: crng init done
Dec 13 13:56:15.727468 kernel: ACPI: Early table checksum verification disabled
Dec 13 13:56:15.727474 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS )
Dec 13 13:56:15.727481 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS  BXPC     00000001      01000013)
Dec 13 13:56:15.727487 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS  BXPC     00000001 BXPC 00000001)
Dec 13 13:56:15.727492 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS  BXPC     00000001 BXPC 00000001)
Dec 13 13:56:15.727498 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS  BXPC     00000001 BXPC 00000001)
Dec 13 13:56:15.727504 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS  BXPC     00000001 BXPC 00000001)
Dec 13 13:56:15.727509 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS  BXPC     00000001 BXPC 00000001)
Dec 13 13:56:15.727515 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS  BXPC     00000001 BXPC 00000001)
Dec 13 13:56:15.727523 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS  BXPC     00000001 BXPC 00000001)
Dec 13 13:56:15.727529 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS  BXPC     00000001 BXPC 00000001)
Dec 13 13:56:15.727535 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS  BXPC     00000001 BXPC 00000001)
Dec 13 13:56:15.727541 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600
Dec 13 13:56:15.727547 kernel: NUMA: Failed to initialise from firmware
Dec 13 13:56:15.727553 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff]
Dec 13 13:56:15.727558 kernel: NUMA: NODE_DATA [mem 0xdcb0a900-0xdcb0ffff]
Dec 13 13:56:15.727564 kernel: Zone ranges:
Dec 13 13:56:15.727570 kernel:   DMA      [mem 0x0000000040000000-0x00000000dcffffff]
Dec 13 13:56:15.727577 kernel:   DMA32    empty
Dec 13 13:56:15.727582 kernel:   Normal   empty
Dec 13 13:56:15.727588 kernel: Movable zone start for each node
Dec 13 13:56:15.727594 kernel: Early memory node ranges
Dec 13 13:56:15.727600 kernel:   node   0: [mem 0x0000000040000000-0x00000000d924ffff]
Dec 13 13:56:15.727606 kernel:   node   0: [mem 0x00000000d9250000-0x00000000d951ffff]
Dec 13 13:56:15.727611 kernel:   node   0: [mem 0x00000000d9520000-0x00000000dc7fffff]
Dec 13 13:56:15.727617 kernel:   node   0: [mem 0x00000000dc800000-0x00000000dc88ffff]
Dec 13 13:56:15.727623 kernel:   node   0: [mem 0x00000000dc890000-0x00000000dc89ffff]
Dec 13 13:56:15.727629 kernel:   node   0: [mem 0x00000000dc8a0000-0x00000000dc9bffff]
Dec 13 13:56:15.727634 kernel:   node   0: [mem 0x00000000dc9c0000-0x00000000dcffffff]
Dec 13 13:56:15.727640 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff]
Dec 13 13:56:15.727647 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges
Dec 13 13:56:15.727653 kernel: psci: probing for conduit method from ACPI.
Dec 13 13:56:15.727659 kernel: psci: PSCIv1.1 detected in firmware.
Dec 13 13:56:15.727665 kernel: psci: Using standard PSCI v0.2 function IDs
Dec 13 13:56:15.727671 kernel: psci: Trusted OS migration not required
Dec 13 13:56:15.727679 kernel: psci: SMC Calling Convention v1.1
Dec 13 13:56:15.727685 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003)
Dec 13 13:56:15.727693 kernel: ACPI: SRAT not present
Dec 13 13:56:15.727700 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880
Dec 13 13:56:15.727706 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096
Dec 13 13:56:15.727712 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 
Dec 13 13:56:15.727719 kernel: Detected PIPT I-cache on CPU0
Dec 13 13:56:15.727725 kernel: CPU features: detected: GIC system register CPU interface
Dec 13 13:56:15.727731 kernel: CPU features: detected: Hardware dirty bit management
Dec 13 13:56:15.727737 kernel: CPU features: detected: Spectre-v4
Dec 13 13:56:15.727743 kernel: CPU features: detected: Spectre-BHB
Dec 13 13:56:15.727751 kernel: CPU features: kernel page table isolation forced ON by KASLR
Dec 13 13:56:15.727757 kernel: CPU features: detected: Kernel page table isolation (KPTI)
Dec 13 13:56:15.727763 kernel: CPU features: detected: ARM erratum 1418040
Dec 13 13:56:15.727769 kernel: CPU features: detected: SSBS not fully self-synchronizing
Dec 13 13:56:15.727775 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 633024
Dec 13 13:56:15.727782 kernel: Policy zone: DMA
Dec 13 13:56:15.727789 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601
Dec 13 13:56:15.727796 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space.
Dec 13 13:56:15.727802 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear)
Dec 13 13:56:15.727808 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Dec 13 13:56:15.727815 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off
Dec 13 13:56:15.727823 kernel: Memory: 2457400K/2572288K available (9792K kernel code, 2092K rwdata, 7576K rodata, 36416K init, 777K bss, 114888K reserved, 0K cma-reserved)
Dec 13 13:56:15.727834 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1
Dec 13 13:56:15.727841 kernel: trace event string verifier disabled
Dec 13 13:56:15.727847 kernel: rcu: Preemptible hierarchical RCU implementation.
Dec 13 13:56:15.727854 kernel: rcu:         RCU event tracing is enabled.
Dec 13 13:56:15.727860 kernel: rcu:         RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4.
Dec 13 13:56:15.727866 kernel:         Trampoline variant of Tasks RCU enabled.
Dec 13 13:56:15.727873 kernel:         Tracing variant of Tasks RCU enabled.
Dec 13 13:56:15.727879 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Dec 13 13:56:15.727885 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4
Dec 13 13:56:15.727891 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0
Dec 13 13:56:15.727899 kernel: GICv3: 256 SPIs implemented
Dec 13 13:56:15.727905 kernel: GICv3: 0 Extended SPIs implemented
Dec 13 13:56:15.727911 kernel: GICv3: Distributor has no Range Selector support
Dec 13 13:56:15.727917 kernel: Root IRQ handler: gic_handle_irq
Dec 13 13:56:15.727923 kernel: GICv3: 16 PPIs implemented
Dec 13 13:56:15.727930 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000
Dec 13 13:56:15.727936 kernel: ACPI: SRAT not present
Dec 13 13:56:15.727942 kernel: ITS [mem 0x08080000-0x0809ffff]
Dec 13 13:56:15.727948 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1)
Dec 13 13:56:15.727954 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1)
Dec 13 13:56:15.727961 kernel: GICv3: using LPI property table @0x00000000400d0000
Dec 13 13:56:15.727967 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000
Dec 13 13:56:15.727974 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040
Dec 13 13:56:15.727981 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt).
Dec 13 13:56:15.727987 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns
Dec 13 13:56:15.727993 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns
Dec 13 13:56:15.727999 kernel: arm-pv: using stolen time PV
Dec 13 13:56:15.728006 kernel: Console: colour dummy device 80x25
Dec 13 13:56:15.728012 kernel: ACPI: Core revision 20210730
Dec 13 13:56:15.728019 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000)
Dec 13 13:56:15.728026 kernel: pid_max: default: 32768 minimum: 301
Dec 13 13:56:15.728032 kernel: LSM: Security Framework initializing
Dec 13 13:56:15.728039 kernel: SELinux:  Initializing.
Dec 13 13:56:15.728046 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
Dec 13 13:56:15.728052 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
Dec 13 13:56:15.728059 kernel: rcu: Hierarchical SRCU implementation.
Dec 13 13:56:15.728065 kernel: Platform MSI: ITS@0x8080000 domain created
Dec 13 13:56:15.728072 kernel: PCI/MSI: ITS@0x8080000 domain created
Dec 13 13:56:15.728078 kernel: Remapping and enabling EFI services.
Dec 13 13:56:15.728084 kernel: smp: Bringing up secondary CPUs ...
Dec 13 13:56:15.728091 kernel: Detected PIPT I-cache on CPU1
Dec 13 13:56:15.728099 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000
Dec 13 13:56:15.728106 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000
Dec 13 13:56:15.728112 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040
Dec 13 13:56:15.728118 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1]
Dec 13 13:56:15.728125 kernel: Detected PIPT I-cache on CPU2
Dec 13 13:56:15.728131 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000
Dec 13 13:56:15.728138 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000
Dec 13 13:56:15.728144 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040
Dec 13 13:56:15.728150 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1]
Dec 13 13:56:15.728157 kernel: Detected PIPT I-cache on CPU3
Dec 13 13:56:15.728164 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000
Dec 13 13:56:15.728171 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000
Dec 13 13:56:15.728177 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040
Dec 13 13:56:15.728183 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1]
Dec 13 13:56:15.728194 kernel: smp: Brought up 1 node, 4 CPUs
Dec 13 13:56:15.728202 kernel: SMP: Total of 4 processors activated.
Dec 13 13:56:15.728208 kernel: CPU features: detected: 32-bit EL0 Support
Dec 13 13:56:15.728215 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence
Dec 13 13:56:15.728222 kernel: CPU features: detected: Common not Private translations
Dec 13 13:56:15.728229 kernel: CPU features: detected: CRC32 instructions
Dec 13 13:56:15.728243 kernel: CPU features: detected: RCpc load-acquire (LDAPR)
Dec 13 13:56:15.728250 kernel: CPU features: detected: LSE atomic instructions
Dec 13 13:56:15.728258 kernel: CPU features: detected: Privileged Access Never
Dec 13 13:56:15.728265 kernel: CPU features: detected: RAS Extension Support
Dec 13 13:56:15.728272 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS)
Dec 13 13:56:15.728278 kernel: CPU: All CPU(s) started at EL1
Dec 13 13:56:15.728285 kernel: alternatives: patching kernel code
Dec 13 13:56:15.728293 kernel: devtmpfs: initialized
Dec 13 13:56:15.728300 kernel: KASLR enabled
Dec 13 13:56:15.728307 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Dec 13 13:56:15.728314 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear)
Dec 13 13:56:15.728320 kernel: pinctrl core: initialized pinctrl subsystem
Dec 13 13:56:15.728327 kernel: SMBIOS 3.0.0 present.
Dec 13 13:56:15.728334 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015
Dec 13 13:56:15.728341 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Dec 13 13:56:15.728348 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations
Dec 13 13:56:15.728356 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations
Dec 13 13:56:15.728363 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations
Dec 13 13:56:15.728370 kernel: audit: initializing netlink subsys (disabled)
Dec 13 13:56:15.728376 kernel: audit: type=2000 audit(0.031:1): state=initialized audit_enabled=0 res=1
Dec 13 13:56:15.728383 kernel: thermal_sys: Registered thermal governor 'step_wise'
Dec 13 13:56:15.728390 kernel: cpuidle: using governor menu
Dec 13 13:56:15.728396 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers.
Dec 13 13:56:15.728403 kernel: ASID allocator initialised with 32768 entries
Dec 13 13:56:15.728410 kernel: ACPI: bus type PCI registered
Dec 13 13:56:15.728418 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Dec 13 13:56:15.728425 kernel: Serial: AMBA PL011 UART driver
Dec 13 13:56:15.728431 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
Dec 13 13:56:15.728438 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages
Dec 13 13:56:15.728445 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
Dec 13 13:56:15.728451 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages
Dec 13 13:56:15.728458 kernel: cryptd: max_cpu_qlen set to 1000
Dec 13 13:56:15.728465 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng)
Dec 13 13:56:15.728472 kernel: ACPI: Added _OSI(Module Device)
Dec 13 13:56:15.728479 kernel: ACPI: Added _OSI(Processor Device)
Dec 13 13:56:15.728486 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Dec 13 13:56:15.728493 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Dec 13 13:56:15.728500 kernel: ACPI: Added _OSI(Linux-Dell-Video)
Dec 13 13:56:15.728506 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
Dec 13 13:56:15.728513 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
Dec 13 13:56:15.728520 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded
Dec 13 13:56:15.728527 kernel: ACPI: Interpreter enabled
Dec 13 13:56:15.728533 kernel: ACPI: Using GIC for interrupt routing
Dec 13 13:56:15.728541 kernel: ACPI: MCFG table detected, 1 entries
Dec 13 13:56:15.728548 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA
Dec 13 13:56:15.728554 kernel: printk: console [ttyAMA0] enabled
Dec 13 13:56:15.728561 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
Dec 13 13:56:15.728681 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3]
Dec 13 13:56:15.728745 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR]
Dec 13 13:56:15.728833 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability]
Dec 13 13:56:15.728906 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00
Dec 13 13:56:15.729069 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff]
Dec 13 13:56:15.729083 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io  0x0000-0xffff window]
Dec 13 13:56:15.729091 kernel: PCI host bridge to bus 0000:00
Dec 13 13:56:15.729163 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window]
Dec 13 13:56:15.729218 kernel: pci_bus 0000:00: root bus resource [io  0x0000-0xffff window]
Dec 13 13:56:15.729301 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window]
Dec 13 13:56:15.729358 kernel: pci_bus 0000:00: root bus resource [bus 00-ff]
Dec 13 13:56:15.729440 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000
Dec 13 13:56:15.729513 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00
Dec 13 13:56:15.729577 kernel: pci 0000:00:01.0: reg 0x10: [io  0x0000-0x001f]
Dec 13 13:56:15.729639 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff]
Dec 13 13:56:15.729725 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref]
Dec 13 13:56:15.729790 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref]
Dec 13 13:56:15.729869 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff]
Dec 13 13:56:15.729933 kernel: pci 0000:00:01.0: BAR 0: assigned [io  0x1000-0x101f]
Dec 13 13:56:15.729988 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window]
Dec 13 13:56:15.730043 kernel: pci_bus 0000:00: resource 5 [io  0x0000-0xffff window]
Dec 13 13:56:15.730113 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window]
Dec 13 13:56:15.730124 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35
Dec 13 13:56:15.730132 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36
Dec 13 13:56:15.730139 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37
Dec 13 13:56:15.730148 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38
Dec 13 13:56:15.730155 kernel: iommu: Default domain type: Translated 
Dec 13 13:56:15.730162 kernel: iommu: DMA domain TLB invalidation policy: strict mode 
Dec 13 13:56:15.730169 kernel: vgaarb: loaded
Dec 13 13:56:15.730176 kernel: pps_core: LinuxPPS API ver. 1 registered
Dec 13 13:56:15.730183 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Dec 13 13:56:15.730189 kernel: PTP clock support registered
Dec 13 13:56:15.730196 kernel: Registered efivars operations
Dec 13 13:56:15.730203 kernel: clocksource: Switched to clocksource arch_sys_counter
Dec 13 13:56:15.730211 kernel: VFS: Disk quotas dquot_6.6.0
Dec 13 13:56:15.730218 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Dec 13 13:56:15.730225 kernel: pnp: PnP ACPI init
Dec 13 13:56:15.730303 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved
Dec 13 13:56:15.730314 kernel: pnp: PnP ACPI: found 1 devices
Dec 13 13:56:15.730321 kernel: NET: Registered PF_INET protocol family
Dec 13 13:56:15.730328 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear)
Dec 13 13:56:15.730335 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear)
Dec 13 13:56:15.730344 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Dec 13 13:56:15.730351 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear)
Dec 13 13:56:15.730358 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear)
Dec 13 13:56:15.730365 kernel: TCP: Hash tables configured (established 32768 bind 32768)
Dec 13 13:56:15.730372 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear)
Dec 13 13:56:15.730378 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear)
Dec 13 13:56:15.730385 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Dec 13 13:56:15.730392 kernel: PCI: CLS 0 bytes, default 64
Dec 13 13:56:15.730399 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available
Dec 13 13:56:15.730407 kernel: kvm [1]: HYP mode not available
Dec 13 13:56:15.730414 kernel: Initialise system trusted keyrings
Dec 13 13:56:15.730420 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0
Dec 13 13:56:15.730427 kernel: Key type asymmetric registered
Dec 13 13:56:15.730434 kernel: Asymmetric key parser 'x509' registered
Dec 13 13:56:15.730440 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249)
Dec 13 13:56:15.730447 kernel: io scheduler mq-deadline registered
Dec 13 13:56:15.730454 kernel: io scheduler kyber registered
Dec 13 13:56:15.730460 kernel: io scheduler bfq registered
Dec 13 13:56:15.730468 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0
Dec 13 13:56:15.730475 kernel: ACPI: button: Power Button [PWRB]
Dec 13 13:56:15.730482 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36
Dec 13 13:56:15.730543 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007)
Dec 13 13:56:15.730553 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Dec 13 13:56:15.730560 kernel: thunder_xcv, ver 1.0
Dec 13 13:56:15.730566 kernel: thunder_bgx, ver 1.0
Dec 13 13:56:15.730573 kernel: nicpf, ver 1.0
Dec 13 13:56:15.730579 kernel: nicvf, ver 1.0
Dec 13 13:56:15.730648 kernel: rtc-efi rtc-efi.0: registered as rtc0
Dec 13 13:56:15.730706 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-12-13T13:56:15 UTC (1734098175)
Dec 13 13:56:15.730715 kernel: hid: raw HID events driver (C) Jiri Kosina
Dec 13 13:56:15.730722 kernel: NET: Registered PF_INET6 protocol family
Dec 13 13:56:15.730729 kernel: Segment Routing with IPv6
Dec 13 13:56:15.730736 kernel: In-situ OAM (IOAM) with IPv6
Dec 13 13:56:15.730743 kernel: NET: Registered PF_PACKET protocol family
Dec 13 13:56:15.730750 kernel: Key type dns_resolver registered
Dec 13 13:56:15.730758 kernel: registered taskstats version 1
Dec 13 13:56:15.730765 kernel: Loading compiled-in X.509 certificates
Dec 13 13:56:15.730771 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e011ba9949ade5a6d03f7a5e28171f7f59e70f8a'
Dec 13 13:56:15.730778 kernel: Key type .fscrypt registered
Dec 13 13:56:15.730785 kernel: Key type fscrypt-provisioning registered
Dec 13 13:56:15.730792 kernel: ima: No TPM chip found, activating TPM-bypass!
Dec 13 13:56:15.730798 kernel: ima: Allocated hash algorithm: sha1
Dec 13 13:56:15.730805 kernel: ima: No architecture policies found
Dec 13 13:56:15.730812 kernel: clk: Disabling unused clocks
Dec 13 13:56:15.730820 kernel: Freeing unused kernel memory: 36416K
Dec 13 13:56:15.730832 kernel: Run /init as init process
Dec 13 13:56:15.730841 kernel:   with arguments:
Dec 13 13:56:15.730847 kernel:     /init
Dec 13 13:56:15.730854 kernel:   with environment:
Dec 13 13:56:15.730860 kernel:     HOME=/
Dec 13 13:56:15.730867 kernel:     TERM=linux
Dec 13 13:56:15.730873 kernel:     BOOT_IMAGE=/flatcar/vmlinuz-a
Dec 13 13:56:15.730882 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Dec 13 13:56:15.730892 systemd[1]: Detected virtualization kvm.
Dec 13 13:56:15.730900 systemd[1]: Detected architecture arm64.
Dec 13 13:56:15.730906 systemd[1]: Running in initrd.
Dec 13 13:56:15.730913 systemd[1]: No hostname configured, using default hostname.
Dec 13 13:56:15.730920 systemd[1]: Hostname set to <localhost>.
Dec 13 13:56:15.730928 systemd[1]: Initializing machine ID from VM UUID.
Dec 13 13:56:15.730935 systemd[1]: Queued start job for default target initrd.target.
Dec 13 13:56:15.730943 systemd[1]: Started systemd-ask-password-console.path.
Dec 13 13:56:15.730951 systemd[1]: Reached target cryptsetup.target.
Dec 13 13:56:15.730958 systemd[1]: Reached target paths.target.
Dec 13 13:56:15.730965 systemd[1]: Reached target slices.target.
Dec 13 13:56:15.730972 systemd[1]: Reached target swap.target.
Dec 13 13:56:15.730979 systemd[1]: Reached target timers.target.
Dec 13 13:56:15.730986 systemd[1]: Listening on iscsid.socket.
Dec 13 13:56:15.730994 systemd[1]: Listening on iscsiuio.socket.
Dec 13 13:56:15.731002 systemd[1]: Listening on systemd-journald-audit.socket.
Dec 13 13:56:15.731009 systemd[1]: Listening on systemd-journald-dev-log.socket.
Dec 13 13:56:15.731016 systemd[1]: Listening on systemd-journald.socket.
Dec 13 13:56:15.731023 systemd[1]: Listening on systemd-networkd.socket.
Dec 13 13:56:15.731031 systemd[1]: Listening on systemd-udevd-control.socket.
Dec 13 13:56:15.731038 systemd[1]: Listening on systemd-udevd-kernel.socket.
Dec 13 13:56:15.731045 systemd[1]: Reached target sockets.target.
Dec 13 13:56:15.731052 systemd[1]: Starting kmod-static-nodes.service...
Dec 13 13:56:15.731060 systemd[1]: Finished network-cleanup.service.
Dec 13 13:56:15.731067 systemd[1]: Starting systemd-fsck-usr.service...
Dec 13 13:56:15.731075 systemd[1]: Starting systemd-journald.service...
Dec 13 13:56:15.731082 systemd[1]: Starting systemd-modules-load.service...
Dec 13 13:56:15.731089 systemd[1]: Starting systemd-resolved.service...
Dec 13 13:56:15.731096 systemd[1]: Starting systemd-vconsole-setup.service...
Dec 13 13:56:15.731103 systemd[1]: Finished kmod-static-nodes.service.
Dec 13 13:56:15.731110 systemd[1]: Finished systemd-fsck-usr.service.
Dec 13 13:56:15.731117 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Dec 13 13:56:15.731126 systemd[1]: Finished systemd-vconsole-setup.service.
Dec 13 13:56:15.731133 kernel: audit: type=1130 audit(1734098175.726:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:15.731141 systemd[1]: Starting dracut-cmdline-ask.service...
Dec 13 13:56:15.731151 systemd-journald[290]: Journal started
Dec 13 13:56:15.731193 systemd-journald[290]: Runtime Journal (/run/log/journal/9587e49f8565403398c36de36bbc2b00) is 6.0M, max 48.7M, 42.6M free.
Dec 13 13:56:15.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:15.722938 systemd-modules-load[291]: Inserted module 'overlay'
Dec 13 13:56:15.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:15.735004 systemd[1]: Started systemd-journald.service.
Dec 13 13:56:15.735032 kernel: audit: type=1130 audit(1734098175.732:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:15.735541 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Dec 13 13:56:15.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:15.745494 kernel: audit: type=1130 audit(1734098175.735:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:15.747263 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Dec 13 13:56:15.747907 systemd-resolved[292]: Positive Trust Anchors:
Dec 13 13:56:15.747923 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Dec 13 13:56:15.747952 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Dec 13 13:56:15.754390 systemd-modules-load[291]: Inserted module 'br_netfilter'
Dec 13 13:56:15.755250 kernel: Bridge firewalling registered
Dec 13 13:56:15.755950 systemd-resolved[292]: Defaulting to hostname 'linux'.
Dec 13 13:56:15.756948 systemd[1]: Started systemd-resolved.service.
Dec 13 13:56:15.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:15.760741 systemd[1]: Finished dracut-cmdline-ask.service.
Dec 13 13:56:15.763690 kernel: audit: type=1130 audit(1734098175.758:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:15.763709 kernel: audit: type=1130 audit(1734098175.761:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:15.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:15.763204 systemd[1]: Reached target nss-lookup.target.
Dec 13 13:56:15.765028 systemd[1]: Starting dracut-cmdline.service...
Dec 13 13:56:15.770414 kernel: SCSI subsystem initialized
Dec 13 13:56:15.775123 dracut-cmdline[308]: dracut-dracut-053
Dec 13 13:56:15.777854 dracut-cmdline[308]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601
Dec 13 13:56:15.782066 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
Dec 13 13:56:15.782083 kernel: device-mapper: uevent: version 1.0.3
Dec 13 13:56:15.782092 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com
Dec 13 13:56:15.784486 systemd-modules-load[291]: Inserted module 'dm_multipath'
Dec 13 13:56:15.785322 systemd[1]: Finished systemd-modules-load.service.
Dec 13 13:56:15.786781 systemd[1]: Starting systemd-sysctl.service...
Dec 13 13:56:15.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:15.790284 kernel: audit: type=1130 audit(1734098175.785:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:15.795455 systemd[1]: Finished systemd-sysctl.service.
Dec 13 13:56:15.798273 kernel: audit: type=1130 audit(1734098175.795:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:15.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:15.847266 kernel: Loading iSCSI transport class v2.0-870.
Dec 13 13:56:15.859270 kernel: iscsi: registered transport (tcp)
Dec 13 13:56:15.878318 kernel: iscsi: registered transport (qla4xxx)
Dec 13 13:56:15.878335 kernel: QLogic iSCSI HBA Driver
Dec 13 13:56:15.910966 systemd[1]: Finished dracut-cmdline.service.
Dec 13 13:56:15.912449 systemd[1]: Starting dracut-pre-udev.service...
Dec 13 13:56:15.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:15.915267 kernel: audit: type=1130 audit(1734098175.911:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:15.956261 kernel: raid6: neonx8   gen() 13760 MB/s
Dec 13 13:56:15.973250 kernel: raid6: neonx8   xor() 10847 MB/s
Dec 13 13:56:15.990265 kernel: raid6: neonx4   gen() 13541 MB/s
Dec 13 13:56:16.008192 kernel: raid6: neonx4   xor() 11167 MB/s
Dec 13 13:56:16.024258 kernel: raid6: neonx2   gen() 12959 MB/s
Dec 13 13:56:16.041262 kernel: raid6: neonx2   xor() 10324 MB/s
Dec 13 13:56:16.058254 kernel: raid6: neonx1   gen() 10548 MB/s
Dec 13 13:56:16.075258 kernel: raid6: neonx1   xor()  8799 MB/s
Dec 13 13:56:16.092248 kernel: raid6: int64x8  gen()  6278 MB/s
Dec 13 13:56:16.109257 kernel: raid6: int64x8  xor()  3544 MB/s
Dec 13 13:56:16.126266 kernel: raid6: int64x4  gen()  7246 MB/s
Dec 13 13:56:16.143260 kernel: raid6: int64x4  xor()  3856 MB/s
Dec 13 13:56:16.160264 kernel: raid6: int64x2  gen()  6155 MB/s
Dec 13 13:56:16.177251 kernel: raid6: int64x2  xor()  3322 MB/s
Dec 13 13:56:16.194250 kernel: raid6: int64x1  gen()  5046 MB/s
Dec 13 13:56:16.211455 kernel: raid6: int64x1  xor()  2646 MB/s
Dec 13 13:56:16.211475 kernel: raid6: using algorithm neonx8 gen() 13760 MB/s
Dec 13 13:56:16.211493 kernel: raid6: .... xor() 10847 MB/s, rmw enabled
Dec 13 13:56:16.211509 kernel: raid6: using neon recovery algorithm
Dec 13 13:56:16.222559 kernel: xor: measuring software checksum speed
Dec 13 13:56:16.222582 kernel:    8regs           : 17209 MB/sec
Dec 13 13:56:16.222591 kernel:    32regs          : 20723 MB/sec
Dec 13 13:56:16.223485 kernel:    arm64_neon      : 27635 MB/sec
Dec 13 13:56:16.223501 kernel: xor: using function: arm64_neon (27635 MB/sec)
Dec 13 13:56:16.280259 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no
Dec 13 13:56:16.290254 systemd[1]: Finished dracut-pre-udev.service.
Dec 13 13:56:16.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:16.291000 audit: BPF prog-id=7 op=LOAD
Dec 13 13:56:16.292000 audit: BPF prog-id=8 op=LOAD
Dec 13 13:56:16.293256 kernel: audit: type=1130 audit(1734098176.290:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:16.293439 systemd[1]: Starting systemd-udevd.service...
Dec 13 13:56:16.305470 systemd-udevd[489]: Using default interface naming scheme 'v252'.
Dec 13 13:56:16.308696 systemd[1]: Started systemd-udevd.service.
Dec 13 13:56:16.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:16.310560 systemd[1]: Starting dracut-pre-trigger.service...
Dec 13 13:56:16.322145 dracut-pre-trigger[495]: rd.md=0: removing MD RAID activation
Dec 13 13:56:16.348711 systemd[1]: Finished dracut-pre-trigger.service.
Dec 13 13:56:16.350097 systemd[1]: Starting systemd-udev-trigger.service...
Dec 13 13:56:16.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:16.405876 systemd[1]: Finished systemd-udev-trigger.service.
Dec 13 13:56:16.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:16.432263 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB)
Dec 13 13:56:16.437754 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk.
Dec 13 13:56:16.437770 kernel: GPT:9289727 != 19775487
Dec 13 13:56:16.437778 kernel: GPT:Alternate GPT header not at the end of the disk.
Dec 13 13:56:16.437787 kernel: GPT:9289727 != 19775487
Dec 13 13:56:16.437796 kernel: GPT: Use GNU Parted to correct GPT errors.
Dec 13 13:56:16.437804 kernel:  vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9
Dec 13 13:56:16.454269 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (543)
Dec 13 13:56:16.458135 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device.
Dec 13 13:56:16.458939 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device.
Dec 13 13:56:16.462647 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device.
Dec 13 13:56:16.465849 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device.
Dec 13 13:56:16.468990 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Dec 13 13:56:16.470412 systemd[1]: Starting disk-uuid.service...
Dec 13 13:56:16.476054 disk-uuid[561]: Primary Header is updated.
Dec 13 13:56:16.476054 disk-uuid[561]: Secondary Entries is updated.
Dec 13 13:56:16.476054 disk-uuid[561]: Secondary Header is updated.
Dec 13 13:56:16.478631 kernel:  vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9
Dec 13 13:56:17.490899 disk-uuid[562]: The operation has completed successfully.
Dec 13 13:56:17.492143 kernel:  vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9
Dec 13 13:56:17.508844 systemd[1]: disk-uuid.service: Deactivated successfully.
Dec 13 13:56:17.508940 systemd[1]: Finished disk-uuid.service.
Dec 13 13:56:17.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:17.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:17.516598 systemd[1]: Starting verity-setup.service...
Dec 13 13:56:17.537251 kernel: device-mapper: verity: sha256 using implementation "sha256-ce"
Dec 13 13:56:17.556174 systemd[1]: Found device dev-mapper-usr.device.
Dec 13 13:56:17.558218 systemd[1]: Mounting sysusr-usr.mount...
Dec 13 13:56:17.559852 systemd[1]: Finished verity-setup.service.
Dec 13 13:56:17.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:17.606266 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none.
Dec 13 13:56:17.606689 systemd[1]: Mounted sysusr-usr.mount.
Dec 13 13:56:17.607332 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met.
Dec 13 13:56:17.608030 systemd[1]: Starting ignition-setup.service...
Dec 13 13:56:17.609677 systemd[1]: Starting parse-ip-for-networkd.service...
Dec 13 13:56:17.616649 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm
Dec 13 13:56:17.616685 kernel: BTRFS info (device vda6): using free space tree
Dec 13 13:56:17.616699 kernel: BTRFS info (device vda6): has skinny extents
Dec 13 13:56:17.625949 systemd[1]: mnt-oem.mount: Deactivated successfully.
Dec 13 13:56:17.632420 systemd[1]: Finished ignition-setup.service.
Dec 13 13:56:17.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:17.633869 systemd[1]: Starting ignition-fetch-offline.service...
Dec 13 13:56:17.690880 systemd[1]: Finished parse-ip-for-networkd.service.
Dec 13 13:56:17.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:17.691000 audit: BPF prog-id=9 op=LOAD
Dec 13 13:56:17.692771 systemd[1]: Starting systemd-networkd.service...
Dec 13 13:56:17.713629 ignition[648]: Ignition 2.14.0
Dec 13 13:56:17.713639 ignition[648]: Stage: fetch-offline
Dec 13 13:56:17.713676 ignition[648]: no configs at "/usr/lib/ignition/base.d"
Dec 13 13:56:17.713684 ignition[648]: no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Dec 13 13:56:17.713808 ignition[648]: parsed url from cmdline: ""
Dec 13 13:56:17.713811 ignition[648]: no config URL provided
Dec 13 13:56:17.713816 ignition[648]: reading system config file "/usr/lib/ignition/user.ign"
Dec 13 13:56:17.713832 ignition[648]: no config at "/usr/lib/ignition/user.ign"
Dec 13 13:56:17.713849 ignition[648]: op(1): [started]  loading QEMU firmware config module
Dec 13 13:56:17.713854 ignition[648]: op(1): executing: "modprobe" "qemu_fw_cfg"
Dec 13 13:56:17.719967 systemd-networkd[735]: lo: Link UP
Dec 13 13:56:17.719976 systemd-networkd[735]: lo: Gained carrier
Dec 13 13:56:17.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:17.720652 ignition[648]: op(1): [finished] loading QEMU firmware config module
Dec 13 13:56:17.720373 systemd-networkd[735]: Enumeration completed
Dec 13 13:56:17.720542 systemd-networkd[735]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Dec 13 13:56:17.720653 systemd[1]: Started systemd-networkd.service.
Dec 13 13:56:17.721555 systemd-networkd[735]: eth0: Link UP
Dec 13 13:56:17.721559 systemd-networkd[735]: eth0: Gained carrier
Dec 13 13:56:17.721629 systemd[1]: Reached target network.target.
Dec 13 13:56:17.723548 systemd[1]: Starting iscsiuio.service...
Dec 13 13:56:17.731770 ignition[648]: parsing config with SHA512: 98093ec13bf74b9428ee5ff0743e07d66b7a52cf6d17ea692203530e99ebdeb4de949adffe8c41bd5b4581b232840aeb892f132ae242e8b2a7d9787cbcc48f8c
Dec 13 13:56:17.732673 systemd[1]: Started iscsiuio.service.
Dec 13 13:56:17.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:17.734194 systemd[1]: Starting iscsid.service...
Dec 13 13:56:17.738284 iscsid[741]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi
Dec 13 13:56:17.738284 iscsid[741]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier].
Dec 13 13:56:17.738284 iscsid[741]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6.
Dec 13 13:56:17.738284 iscsid[741]: If using hardware iscsi like qla4xxx this message can be ignored.
Dec 13 13:56:17.738284 iscsid[741]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi
Dec 13 13:56:17.738284 iscsid[741]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf
Dec 13 13:56:17.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:17.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:17.737930 unknown[648]: fetched base config from "system"
Dec 13 13:56:17.741582 ignition[648]: fetch-offline: fetch-offline passed
Dec 13 13:56:17.737940 unknown[648]: fetched user config from "qemu"
Dec 13 13:56:17.741673 ignition[648]: Ignition finished successfully
Dec 13 13:56:17.740527 systemd[1]: Started iscsid.service.
Dec 13 13:56:17.744657 systemd[1]: Starting dracut-initqueue.service...
Dec 13 13:56:17.745624 systemd-networkd[735]: eth0: DHCPv4 address 10.0.0.19/16, gateway 10.0.0.1 acquired from 10.0.0.1
Dec 13 13:56:17.746397 systemd[1]: Finished ignition-fetch-offline.service.
Dec 13 13:56:17.747151 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json).
Dec 13 13:56:17.747811 systemd[1]: Starting ignition-kargs.service...
Dec 13 13:56:17.756853 systemd[1]: Finished dracut-initqueue.service.
Dec 13 13:56:17.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:17.757595 ignition[744]: Ignition 2.14.0
Dec 13 13:56:17.757558 systemd[1]: Reached target remote-fs-pre.target.
Dec 13 13:56:17.757602 ignition[744]: Stage: kargs
Dec 13 13:56:17.758574 systemd[1]: Reached target remote-cryptsetup.target.
Dec 13 13:56:17.757688 ignition[744]: no configs at "/usr/lib/ignition/base.d"
Dec 13 13:56:17.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:17.759573 systemd[1]: Reached target remote-fs.target.
Dec 13 13:56:17.757696 ignition[744]: no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Dec 13 13:56:17.762300 systemd[1]: Starting dracut-pre-mount.service...
Dec 13 13:56:17.758350 ignition[744]: kargs: kargs passed
Dec 13 13:56:17.763310 systemd[1]: Finished ignition-kargs.service.
Dec 13 13:56:17.758390 ignition[744]: Ignition finished successfully
Dec 13 13:56:17.764948 systemd[1]: Starting ignition-disks.service...
Dec 13 13:56:17.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:17.771502 systemd[1]: Finished dracut-pre-mount.service.
Dec 13 13:56:17.774597 systemd[1]: Finished ignition-disks.service.
Dec 13 13:56:17.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:17.773138 ignition[758]: Ignition 2.14.0
Dec 13 13:56:17.775386 systemd[1]: Reached target initrd-root-device.target.
Dec 13 13:56:17.773144 ignition[758]: Stage: disks
Dec 13 13:56:17.776300 systemd[1]: Reached target local-fs-pre.target.
Dec 13 13:56:17.773254 ignition[758]: no configs at "/usr/lib/ignition/base.d"
Dec 13 13:56:17.777203 systemd[1]: Reached target local-fs.target.
Dec 13 13:56:17.773264 ignition[758]: no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Dec 13 13:56:17.779065 systemd[1]: Reached target sysinit.target.
Dec 13 13:56:17.773890 ignition[758]: disks: disks passed
Dec 13 13:56:17.779869 systemd[1]: Reached target basic.target.
Dec 13 13:56:17.773927 ignition[758]: Ignition finished successfully
Dec 13 13:56:17.781192 systemd[1]: Starting systemd-fsck-root.service...
Dec 13 13:56:17.791975 systemd-fsck[769]: ROOT: clean, 621/553520 files, 56020/553472 blocks
Dec 13 13:56:17.794942 systemd[1]: Finished systemd-fsck-root.service.
Dec 13 13:56:17.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:17.798636 systemd[1]: Mounting sysroot.mount...
Dec 13 13:56:17.804256 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none.
Dec 13 13:56:17.804814 systemd[1]: Mounted sysroot.mount.
Dec 13 13:56:17.805424 systemd[1]: Reached target initrd-root-fs.target.
Dec 13 13:56:17.807292 systemd[1]: Mounting sysroot-usr.mount...
Dec 13 13:56:17.808011 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met.
Dec 13 13:56:17.808046 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot).
Dec 13 13:56:17.808069 systemd[1]: Reached target ignition-diskful.target.
Dec 13 13:56:17.809856 systemd[1]: Mounted sysroot-usr.mount.
Dec 13 13:56:17.811202 systemd[1]: Starting initrd-setup-root.service...
Dec 13 13:56:17.815869 initrd-setup-root[779]: cut: /sysroot/etc/passwd: No such file or directory
Dec 13 13:56:17.820005 initrd-setup-root[787]: cut: /sysroot/etc/group: No such file or directory
Dec 13 13:56:17.823903 initrd-setup-root[795]: cut: /sysroot/etc/shadow: No such file or directory
Dec 13 13:56:17.828010 initrd-setup-root[803]: cut: /sysroot/etc/gshadow: No such file or directory
Dec 13 13:56:17.854307 systemd[1]: Finished initrd-setup-root.service.
Dec 13 13:56:17.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:17.855839 systemd[1]: Starting ignition-mount.service...
Dec 13 13:56:17.856974 systemd[1]: Starting sysroot-boot.service...
Dec 13 13:56:17.861088 bash[821]: umount: /sysroot/usr/share/oem: not mounted.
Dec 13 13:56:17.869539 ignition[823]: INFO     : Ignition 2.14.0
Dec 13 13:56:17.869539 ignition[823]: INFO     : Stage: mount
Dec 13 13:56:17.871295 ignition[823]: INFO     : no configs at "/usr/lib/ignition/base.d"
Dec 13 13:56:17.871295 ignition[823]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Dec 13 13:56:17.871295 ignition[823]: INFO     : mount: mount passed
Dec 13 13:56:17.871295 ignition[823]: INFO     : Ignition finished successfully
Dec 13 13:56:17.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:17.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:17.872450 systemd[1]: Finished ignition-mount.service.
Dec 13 13:56:17.874498 systemd[1]: Finished sysroot-boot.service.
Dec 13 13:56:18.566123 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Dec 13 13:56:18.572351 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (831)
Dec 13 13:56:18.572399 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm
Dec 13 13:56:18.574152 kernel: BTRFS info (device vda6): using free space tree
Dec 13 13:56:18.574185 kernel: BTRFS info (device vda6): has skinny extents
Dec 13 13:56:18.577123 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Dec 13 13:56:18.578715 systemd[1]: Starting ignition-files.service...
Dec 13 13:56:18.594031 ignition[851]: INFO     : Ignition 2.14.0
Dec 13 13:56:18.594031 ignition[851]: INFO     : Stage: files
Dec 13 13:56:18.595373 ignition[851]: INFO     : no configs at "/usr/lib/ignition/base.d"
Dec 13 13:56:18.595373 ignition[851]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Dec 13 13:56:18.595373 ignition[851]: DEBUG    : files: compiled without relabeling support, skipping
Dec 13 13:56:18.598333 ignition[851]: INFO     : files: ensureUsers: op(1): [started]  creating or modifying user "core"
Dec 13 13:56:18.598333 ignition[851]: DEBUG    : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core"
Dec 13 13:56:18.606130 ignition[851]: INFO     : files: ensureUsers: op(1): [finished] creating or modifying user "core"
Dec 13 13:56:18.607216 ignition[851]: INFO     : files: ensureUsers: op(2): [started]  adding ssh keys to user "core"
Dec 13 13:56:18.607216 ignition[851]: INFO     : files: ensureUsers: op(2): [finished] adding ssh keys to user "core"
Dec 13 13:56:18.606901 unknown[851]: wrote ssh authorized keys file for user: core
Dec 13 13:56:18.610173 ignition[851]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [started]  writing file "/sysroot/home/core/install.sh"
Dec 13 13:56:18.610173 ignition[851]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh"
Dec 13 13:56:18.610173 ignition[851]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [started]  writing file "/sysroot/etc/flatcar/update.conf"
Dec 13 13:56:18.610173 ignition[851]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf"
Dec 13 13:56:18.610173 ignition[851]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [started]  writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw"
Dec 13 13:56:18.610173 ignition[851]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw"
Dec 13 13:56:18.610173 ignition[851]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [started]  writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw"
Dec 13 13:56:18.610173 ignition[851]: INFO     : files: createFilesystemsFiles: createFiles: op(6): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-arm64.raw: attempt #1
Dec 13 13:56:18.878349 systemd-networkd[735]: eth0: Gained IPv6LL
Dec 13 13:56:18.962532 ignition[851]: INFO     : files: createFilesystemsFiles: createFiles: op(6): GET result: OK
Dec 13 13:56:19.165102 ignition[851]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw"
Dec 13 13:56:19.165102 ignition[851]: INFO     : files: op(7): [started]  processing unit "coreos-metadata.service"
Dec 13 13:56:19.168148 ignition[851]: INFO     : files: op(7): op(8): [started]  writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service"
Dec 13 13:56:19.168148 ignition[851]: INFO     : files: op(7): op(8): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service"
Dec 13 13:56:19.168148 ignition[851]: INFO     : files: op(7): [finished] processing unit "coreos-metadata.service"
Dec 13 13:56:19.168148 ignition[851]: INFO     : files: op(9): [started]  setting preset to disabled for "coreos-metadata.service"
Dec 13 13:56:19.168148 ignition[851]: INFO     : files: op(9): op(a): [started]  removing enablement symlink(s) for "coreos-metadata.service"
Dec 13 13:56:19.196657 ignition[851]: INFO     : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service"
Dec 13 13:56:19.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.199669 ignition[851]: INFO     : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service"
Dec 13 13:56:19.199669 ignition[851]: INFO     : files: createResultFile: createFiles: op(b): [started]  writing file "/sysroot/etc/.ignition-result.json"
Dec 13 13:56:19.199669 ignition[851]: INFO     : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json"
Dec 13 13:56:19.199669 ignition[851]: INFO     : files: files passed
Dec 13 13:56:19.199669 ignition[851]: INFO     : Ignition finished successfully
Dec 13 13:56:19.198620 systemd[1]: Finished ignition-files.service.
Dec 13 13:56:19.202633 systemd[1]: Starting initrd-setup-root-after-ignition.service...
Dec 13 13:56:19.203616 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile).
Dec 13 13:56:19.204230 systemd[1]: Starting ignition-quench.service...
Dec 13 13:56:19.209315 initrd-setup-root-after-ignition[875]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory
Dec 13 13:56:19.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.211864 initrd-setup-root-after-ignition[878]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory
Dec 13 13:56:19.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.209822 systemd[1]: ignition-quench.service: Deactivated successfully.
Dec 13 13:56:19.209907 systemd[1]: Finished ignition-quench.service.
Dec 13 13:56:19.212098 systemd[1]: Finished initrd-setup-root-after-ignition.service.
Dec 13 13:56:19.212912 systemd[1]: Reached target ignition-complete.target.
Dec 13 13:56:19.214134 systemd[1]: Starting initrd-parse-etc.service...
Dec 13 13:56:19.226185 systemd[1]: initrd-parse-etc.service: Deactivated successfully.
Dec 13 13:56:19.226961 systemd[1]: Finished initrd-parse-etc.service.
Dec 13 13:56:19.229046 systemd[1]: Reached target initrd-fs.target.
Dec 13 13:56:19.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.229885 systemd[1]: Reached target initrd.target.
Dec 13 13:56:19.230868 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met.
Dec 13 13:56:19.231613 systemd[1]: Starting dracut-pre-pivot.service...
Dec 13 13:56:19.241701 systemd[1]: Finished dracut-pre-pivot.service.
Dec 13 13:56:19.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.243057 systemd[1]: Starting initrd-cleanup.service...
Dec 13 13:56:19.250949 systemd[1]: Stopped target nss-lookup.target.
Dec 13 13:56:19.251697 systemd[1]: Stopped target remote-cryptsetup.target.
Dec 13 13:56:19.252384 systemd[1]: Stopped target timers.target.
Dec 13 13:56:19.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.253321 systemd[1]: dracut-pre-pivot.service: Deactivated successfully.
Dec 13 13:56:19.253427 systemd[1]: Stopped dracut-pre-pivot.service.
Dec 13 13:56:19.254477 systemd[1]: Stopped target initrd.target.
Dec 13 13:56:19.255261 systemd[1]: Stopped target basic.target.
Dec 13 13:56:19.258939 systemd[1]: Stopped target ignition-complete.target.
Dec 13 13:56:19.260480 systemd[1]: Stopped target ignition-diskful.target.
Dec 13 13:56:19.261920 systemd[1]: Stopped target initrd-root-device.target.
Dec 13 13:56:19.263451 systemd[1]: Stopped target remote-fs.target.
Dec 13 13:56:19.265100 systemd[1]: Stopped target remote-fs-pre.target.
Dec 13 13:56:19.266099 systemd[1]: Stopped target sysinit.target.
Dec 13 13:56:19.267090 systemd[1]: Stopped target local-fs.target.
Dec 13 13:56:19.268055 systemd[1]: Stopped target local-fs-pre.target.
Dec 13 13:56:19.269037 systemd[1]: Stopped target swap.target.
Dec 13 13:56:19.269973 systemd[1]: dracut-pre-mount.service: Deactivated successfully.
Dec 13 13:56:19.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.270083 systemd[1]: Stopped dracut-pre-mount.service.
Dec 13 13:56:19.270993 systemd[1]: Stopped target cryptsetup.target.
Dec 13 13:56:19.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.272084 systemd[1]: dracut-initqueue.service: Deactivated successfully.
Dec 13 13:56:19.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.272174 systemd[1]: Stopped dracut-initqueue.service.
Dec 13 13:56:19.273179 systemd[1]: ignition-fetch-offline.service: Deactivated successfully.
Dec 13 13:56:19.273293 systemd[1]: Stopped ignition-fetch-offline.service.
Dec 13 13:56:19.274439 systemd[1]: Stopped target paths.target.
Dec 13 13:56:19.275571 systemd[1]: systemd-ask-password-console.path: Deactivated successfully.
Dec 13 13:56:19.280320 systemd[1]: Stopped systemd-ask-password-console.path.
Dec 13 13:56:19.281038 systemd[1]: Stopped target slices.target.
Dec 13 13:56:19.282071 systemd[1]: Stopped target sockets.target.
Dec 13 13:56:19.283067 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully.
Dec 13 13:56:19.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.283172 systemd[1]: Stopped initrd-setup-root-after-ignition.service.
Dec 13 13:56:19.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.284413 systemd[1]: ignition-files.service: Deactivated successfully.
Dec 13 13:56:19.284496 systemd[1]: Stopped ignition-files.service.
Dec 13 13:56:19.291796 iscsid[741]: iscsid shutting down.
Dec 13 13:56:19.290476 systemd[1]: Stopping ignition-mount.service...
Dec 13 13:56:19.293299 systemd[1]: Stopping iscsid.service...
Dec 13 13:56:19.294226 systemd[1]: kmod-static-nodes.service: Deactivated successfully.
Dec 13 13:56:19.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.294362 systemd[1]: Stopped kmod-static-nodes.service.
Dec 13 13:56:19.298651 ignition[891]: INFO     : Ignition 2.14.0
Dec 13 13:56:19.298651 ignition[891]: INFO     : Stage: umount
Dec 13 13:56:19.298651 ignition[891]: INFO     : no configs at "/usr/lib/ignition/base.d"
Dec 13 13:56:19.298651 ignition[891]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/qemu"
Dec 13 13:56:19.298651 ignition[891]: INFO     : umount: umount passed
Dec 13 13:56:19.298651 ignition[891]: INFO     : Ignition finished successfully
Dec 13 13:56:19.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.296186 systemd[1]: Stopping sysroot-boot.service...
Dec 13 13:56:19.298104 systemd[1]: systemd-udev-trigger.service: Deactivated successfully.
Dec 13 13:56:19.298264 systemd[1]: Stopped systemd-udev-trigger.service.
Dec 13 13:56:19.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.299293 systemd[1]: dracut-pre-trigger.service: Deactivated successfully.
Dec 13 13:56:19.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.299390 systemd[1]: Stopped dracut-pre-trigger.service.
Dec 13 13:56:19.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.302041 systemd[1]: iscsid.service: Deactivated successfully.
Dec 13 13:56:19.302144 systemd[1]: Stopped iscsid.service.
Dec 13 13:56:19.303481 systemd[1]: ignition-mount.service: Deactivated successfully.
Dec 13 13:56:19.303566 systemd[1]: Stopped ignition-mount.service.
Dec 13 13:56:19.304581 systemd[1]: iscsid.socket: Deactivated successfully.
Dec 13 13:56:19.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.304646 systemd[1]: Closed iscsid.socket.
Dec 13 13:56:19.306222 systemd[1]: ignition-disks.service: Deactivated successfully.
Dec 13 13:56:19.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.306287 systemd[1]: Stopped ignition-disks.service.
Dec 13 13:56:19.307674 systemd[1]: ignition-kargs.service: Deactivated successfully.
Dec 13 13:56:19.307715 systemd[1]: Stopped ignition-kargs.service.
Dec 13 13:56:19.308756 systemd[1]: ignition-setup.service: Deactivated successfully.
Dec 13 13:56:19.308794 systemd[1]: Stopped ignition-setup.service.
Dec 13 13:56:19.310798 systemd[1]: Stopping iscsiuio.service...
Dec 13 13:56:19.313000 systemd[1]: sysroot-boot.mount: Deactivated successfully.
Dec 13 13:56:19.314393 systemd[1]: iscsiuio.service: Deactivated successfully.
Dec 13 13:56:19.314483 systemd[1]: Stopped iscsiuio.service.
Dec 13 13:56:19.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.315334 systemd[1]: initrd-cleanup.service: Deactivated successfully.
Dec 13 13:56:19.315407 systemd[1]: Finished initrd-cleanup.service.
Dec 13 13:56:19.317479 systemd[1]: Stopped target network.target.
Dec 13 13:56:19.318492 systemd[1]: iscsiuio.socket: Deactivated successfully.
Dec 13 13:56:19.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.318524 systemd[1]: Closed iscsiuio.socket.
Dec 13 13:56:19.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.319857 systemd[1]: Stopping systemd-networkd.service...
Dec 13 13:56:19.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.320601 systemd[1]: Stopping systemd-resolved.service...
Dec 13 13:56:19.323326 systemd-networkd[735]: eth0: DHCPv6 lease lost
Dec 13 13:56:19.334000 audit: BPF prog-id=9 op=UNLOAD
Dec 13 13:56:19.324402 systemd[1]: systemd-networkd.service: Deactivated successfully.
Dec 13 13:56:19.324496 systemd[1]: Stopped systemd-networkd.service.
Dec 13 13:56:19.325726 systemd[1]: systemd-networkd.socket: Deactivated successfully.
Dec 13 13:56:19.325758 systemd[1]: Closed systemd-networkd.socket.
Dec 13 13:56:19.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.327193 systemd[1]: Stopping network-cleanup.service...
Dec 13 13:56:19.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.328103 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully.
Dec 13 13:56:19.328156 systemd[1]: Stopped parse-ip-for-networkd.service.
Dec 13 13:56:19.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.330091 systemd[1]: systemd-sysctl.service: Deactivated successfully.
Dec 13 13:56:19.330135 systemd[1]: Stopped systemd-sysctl.service.
Dec 13 13:56:19.342000 audit: BPF prog-id=6 op=UNLOAD
Dec 13 13:56:19.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.331724 systemd[1]: systemd-modules-load.service: Deactivated successfully.
Dec 13 13:56:19.331764 systemd[1]: Stopped systemd-modules-load.service.
Dec 13 13:56:19.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.332669 systemd[1]: Stopping systemd-udevd.service...
Dec 13 13:56:19.336862 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully.
Dec 13 13:56:19.337350 systemd[1]: systemd-resolved.service: Deactivated successfully.
Dec 13 13:56:19.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.337440 systemd[1]: Stopped systemd-resolved.service.
Dec 13 13:56:19.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.338939 systemd[1]: sysroot-boot.service: Deactivated successfully.
Dec 13 13:56:19.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.339016 systemd[1]: Stopped sysroot-boot.service.
Dec 13 13:56:19.340299 systemd[1]: initrd-setup-root.service: Deactivated successfully.
Dec 13 13:56:19.340346 systemd[1]: Stopped initrd-setup-root.service.
Dec 13 13:56:19.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.342475 systemd[1]: network-cleanup.service: Deactivated successfully.
Dec 13 13:56:19.342560 systemd[1]: Stopped network-cleanup.service.
Dec 13 13:56:19.343898 systemd[1]: systemd-udevd.service: Deactivated successfully.
Dec 13 13:56:19.344001 systemd[1]: Stopped systemd-udevd.service.
Dec 13 13:56:19.345262 systemd[1]: systemd-udevd-control.socket: Deactivated successfully.
Dec 13 13:56:19.345296 systemd[1]: Closed systemd-udevd-control.socket.
Dec 13 13:56:19.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.346145 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully.
Dec 13 13:56:19.346174 systemd[1]: Closed systemd-udevd-kernel.socket.
Dec 13 13:56:19.347187 systemd[1]: dracut-pre-udev.service: Deactivated successfully.
Dec 13 13:56:19.347227 systemd[1]: Stopped dracut-pre-udev.service.
Dec 13 13:56:19.348531 systemd[1]: dracut-cmdline.service: Deactivated successfully.
Dec 13 13:56:19.348568 systemd[1]: Stopped dracut-cmdline.service.
Dec 13 13:56:19.349679 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully.
Dec 13 13:56:19.349714 systemd[1]: Stopped dracut-cmdline-ask.service.
Dec 13 13:56:19.351499 systemd[1]: Starting initrd-udevadm-cleanup-db.service...
Dec 13 13:56:19.352382 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully.
Dec 13 13:56:19.352433 systemd[1]: Stopped systemd-vconsole-setup.service.
Dec 13 13:56:19.356632 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully.
Dec 13 13:56:19.356724 systemd[1]: Finished initrd-udevadm-cleanup-db.service.
Dec 13 13:56:19.358046 systemd[1]: Reached target initrd-switch-root.target.
Dec 13 13:56:19.359762 systemd[1]: Starting initrd-switch-root.service...
Dec 13 13:56:19.366356 systemd[1]: Switching root.
Dec 13 13:56:19.384409 systemd-journald[290]: Journal stopped
Dec 13 13:56:21.320082 systemd-journald[290]: Received SIGTERM from PID 1 (systemd).
Dec 13 13:56:21.320138 kernel: SELinux:  Class mctp_socket not defined in policy.
Dec 13 13:56:21.320150 kernel: SELinux:  Class anon_inode not defined in policy.
Dec 13 13:56:21.320168 kernel: SELinux: the above unknown classes and permissions will be allowed
Dec 13 13:56:21.320178 kernel: SELinux:  policy capability network_peer_controls=1
Dec 13 13:56:21.320192 kernel: SELinux:  policy capability open_perms=1
Dec 13 13:56:21.320201 kernel: SELinux:  policy capability extended_socket_class=1
Dec 13 13:56:21.320211 kernel: SELinux:  policy capability always_check_network=0
Dec 13 13:56:21.320221 kernel: SELinux:  policy capability cgroup_seclabel=1
Dec 13 13:56:21.320230 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Dec 13 13:56:21.320258 kernel: SELinux:  policy capability genfs_seclabel_symlinks=0
Dec 13 13:56:21.320269 kernel: SELinux:  policy capability ioctl_skip_cloexec=0
Dec 13 13:56:21.320279 systemd[1]: Successfully loaded SELinux policy in 31.882ms.
Dec 13 13:56:21.320299 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.097ms.
Dec 13 13:56:21.320312 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Dec 13 13:56:21.320323 systemd[1]: Detected virtualization kvm.
Dec 13 13:56:21.320333 systemd[1]: Detected architecture arm64.
Dec 13 13:56:21.320344 systemd[1]: Detected first boot.
Dec 13 13:56:21.320354 systemd[1]: Initializing machine ID from VM UUID.
Dec 13 13:56:21.320365 kernel: SELinux:  Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped).
Dec 13 13:56:21.320375 systemd[1]: Populated /etc with preset unit settings.
Dec 13 13:56:21.320386 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Dec 13 13:56:21.320398 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Dec 13 13:56:21.320410 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Dec 13 13:56:21.320423 kernel: kauditd_printk_skb: 80 callbacks suppressed
Dec 13 13:56:21.320433 kernel: audit: type=1334 audit(1734098181.205:84): prog-id=12 op=LOAD
Dec 13 13:56:21.320444 kernel: audit: type=1334 audit(1734098181.205:85): prog-id=3 op=UNLOAD
Dec 13 13:56:21.320454 kernel: audit: type=1334 audit(1734098181.205:86): prog-id=13 op=LOAD
Dec 13 13:56:21.320463 kernel: audit: type=1334 audit(1734098181.206:87): prog-id=14 op=LOAD
Dec 13 13:56:21.320474 systemd[1]: initrd-switch-root.service: Deactivated successfully.
Dec 13 13:56:21.320484 kernel: audit: type=1334 audit(1734098181.206:88): prog-id=4 op=UNLOAD
Dec 13 13:56:21.320494 kernel: audit: type=1334 audit(1734098181.206:89): prog-id=5 op=UNLOAD
Dec 13 13:56:21.320504 kernel: audit: type=1131 audit(1734098181.207:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.320514 systemd[1]: Stopped initrd-switch-root.service.
Dec 13 13:56:21.320529 kernel: audit: type=1130 audit(1734098181.213:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.320539 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1.
Dec 13 13:56:21.320550 kernel: audit: type=1131 audit(1734098181.213:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.320561 systemd[1]: Created slice system-addon\x2dconfig.slice.
Dec 13 13:56:21.320571 kernel: audit: type=1334 audit(1734098181.219:93): prog-id=12 op=UNLOAD
Dec 13 13:56:21.320583 systemd[1]: Created slice system-addon\x2drun.slice.
Dec 13 13:56:21.320594 systemd[1]: Created slice system-getty.slice.
Dec 13 13:56:21.320604 systemd[1]: Created slice system-modprobe.slice.
Dec 13 13:56:21.320615 systemd[1]: Created slice system-serial\x2dgetty.slice.
Dec 13 13:56:21.320625 systemd[1]: Created slice system-system\x2dcloudinit.slice.
Dec 13 13:56:21.320635 systemd[1]: Created slice system-systemd\x2dfsck.slice.
Dec 13 13:56:21.320647 systemd[1]: Created slice user.slice.
Dec 13 13:56:21.320658 systemd[1]: Started systemd-ask-password-console.path.
Dec 13 13:56:21.320669 systemd[1]: Started systemd-ask-password-wall.path.
Dec 13 13:56:21.320679 systemd[1]: Set up automount boot.automount.
Dec 13 13:56:21.320690 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount.
Dec 13 13:56:21.320700 systemd[1]: Stopped target initrd-switch-root.target.
Dec 13 13:56:21.320710 systemd[1]: Stopped target initrd-fs.target.
Dec 13 13:56:21.320721 systemd[1]: Stopped target initrd-root-fs.target.
Dec 13 13:56:21.320732 systemd[1]: Reached target integritysetup.target.
Dec 13 13:56:21.320742 systemd[1]: Reached target remote-cryptsetup.target.
Dec 13 13:56:21.320753 systemd[1]: Reached target remote-fs.target.
Dec 13 13:56:21.320763 systemd[1]: Reached target slices.target.
Dec 13 13:56:21.320773 systemd[1]: Reached target swap.target.
Dec 13 13:56:21.320784 systemd[1]: Reached target torcx.target.
Dec 13 13:56:21.320794 systemd[1]: Reached target veritysetup.target.
Dec 13 13:56:21.320806 systemd[1]: Listening on systemd-coredump.socket.
Dec 13 13:56:21.320820 systemd[1]: Listening on systemd-initctl.socket.
Dec 13 13:56:21.320831 systemd[1]: Listening on systemd-networkd.socket.
Dec 13 13:56:21.320841 systemd[1]: Listening on systemd-udevd-control.socket.
Dec 13 13:56:21.320852 systemd[1]: Listening on systemd-udevd-kernel.socket.
Dec 13 13:56:21.320862 systemd[1]: Listening on systemd-userdbd.socket.
Dec 13 13:56:21.320872 systemd[1]: Mounting dev-hugepages.mount...
Dec 13 13:56:21.320883 systemd[1]: Mounting dev-mqueue.mount...
Dec 13 13:56:21.320894 systemd[1]: Mounting media.mount...
Dec 13 13:56:21.320904 systemd[1]: Mounting sys-kernel-debug.mount...
Dec 13 13:56:21.320916 systemd[1]: Mounting sys-kernel-tracing.mount...
Dec 13 13:56:21.320926 systemd[1]: Mounting tmp.mount...
Dec 13 13:56:21.320937 systemd[1]: Starting flatcar-tmpfiles.service...
Dec 13 13:56:21.320947 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Dec 13 13:56:21.320957 systemd[1]: Starting kmod-static-nodes.service...
Dec 13 13:56:21.320968 systemd[1]: Starting modprobe@configfs.service...
Dec 13 13:56:21.320978 systemd[1]: Starting modprobe@dm_mod.service...
Dec 13 13:56:21.320989 systemd[1]: Starting modprobe@drm.service...
Dec 13 13:56:21.320999 systemd[1]: Starting modprobe@efi_pstore.service...
Dec 13 13:56:21.321011 systemd[1]: Starting modprobe@fuse.service...
Dec 13 13:56:21.321021 systemd[1]: Starting modprobe@loop.service...
Dec 13 13:56:21.321032 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf).
Dec 13 13:56:21.321042 systemd[1]: systemd-fsck-root.service: Deactivated successfully.
Dec 13 13:56:21.321052 systemd[1]: Stopped systemd-fsck-root.service.
Dec 13 13:56:21.321062 systemd[1]: systemd-fsck-usr.service: Deactivated successfully.
Dec 13 13:56:21.321072 systemd[1]: Stopped systemd-fsck-usr.service.
Dec 13 13:56:21.321082 systemd[1]: Stopped systemd-journald.service.
Dec 13 13:56:21.321092 kernel: fuse: init (API version 7.34)
Dec 13 13:56:21.321103 systemd[1]: Starting systemd-journald.service...
Dec 13 13:56:21.321114 kernel: loop: module loaded
Dec 13 13:56:21.321124 systemd[1]: Starting systemd-modules-load.service...
Dec 13 13:56:21.321134 systemd[1]: Starting systemd-network-generator.service...
Dec 13 13:56:21.321144 systemd[1]: Starting systemd-remount-fs.service...
Dec 13 13:56:21.321154 systemd[1]: Starting systemd-udev-trigger.service...
Dec 13 13:56:21.321165 systemd[1]: verity-setup.service: Deactivated successfully.
Dec 13 13:56:21.321176 systemd[1]: Stopped verity-setup.service.
Dec 13 13:56:21.321187 systemd[1]: Mounted dev-hugepages.mount.
Dec 13 13:56:21.321198 systemd[1]: Mounted dev-mqueue.mount.
Dec 13 13:56:21.321208 systemd[1]: Mounted media.mount.
Dec 13 13:56:21.321218 systemd[1]: Mounted sys-kernel-debug.mount.
Dec 13 13:56:21.321228 systemd[1]: Mounted sys-kernel-tracing.mount.
Dec 13 13:56:21.321247 systemd[1]: Mounted tmp.mount.
Dec 13 13:56:21.321260 systemd-journald[986]: Journal started
Dec 13 13:56:21.321300 systemd-journald[986]: Runtime Journal (/run/log/journal/9587e49f8565403398c36de36bbc2b00) is 6.0M, max 48.7M, 42.6M free.
Dec 13 13:56:19.443000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1
Dec 13 13:56:19.511000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Dec 13 13:56:19.511000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Dec 13 13:56:19.511000 audit: BPF prog-id=10 op=LOAD
Dec 13 13:56:19.511000 audit: BPF prog-id=10 op=UNLOAD
Dec 13 13:56:19.511000 audit: BPF prog-id=11 op=LOAD
Dec 13 13:56:19.511000 audit: BPF prog-id=11 op=UNLOAD
Dec 13 13:56:19.549000 audit[924]: AVC avc:  denied  { associate } for  pid=924 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023"
Dec 13 13:56:19.549000 audit[924]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400018d8dc a1=4000028e40 a2=4000027100 a3=32 items=0 ppid=907 pid=924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:19.549000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Dec 13 13:56:19.550000 audit[924]: AVC avc:  denied  { associate } for  pid=924 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1
Dec 13 13:56:19.550000 audit[924]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=400018d9b5 a2=1ed a3=0 items=2 ppid=907 pid=924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:19.550000 audit: CWD cwd="/"
Dec 13 13:56:19.550000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 13:56:19.550000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 13:56:19.550000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61
Dec 13 13:56:21.205000 audit: BPF prog-id=12 op=LOAD
Dec 13 13:56:21.205000 audit: BPF prog-id=3 op=UNLOAD
Dec 13 13:56:21.205000 audit: BPF prog-id=13 op=LOAD
Dec 13 13:56:21.206000 audit: BPF prog-id=14 op=LOAD
Dec 13 13:56:21.206000 audit: BPF prog-id=4 op=UNLOAD
Dec 13 13:56:21.206000 audit: BPF prog-id=5 op=UNLOAD
Dec 13 13:56:21.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.219000 audit: BPF prog-id=12 op=UNLOAD
Dec 13 13:56:21.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.295000 audit: BPF prog-id=15 op=LOAD
Dec 13 13:56:21.299000 audit: BPF prog-id=16 op=LOAD
Dec 13 13:56:21.299000 audit: BPF prog-id=17 op=LOAD
Dec 13 13:56:21.299000 audit: BPF prog-id=13 op=UNLOAD
Dec 13 13:56:21.299000 audit: BPF prog-id=14 op=UNLOAD
Dec 13 13:56:21.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.318000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1
Dec 13 13:56:21.318000 audit[986]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffe6e63ec0 a2=4000 a3=1 items=0 ppid=1 pid=986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:21.318000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald"
Dec 13 13:56:21.203806 systemd[1]: Queued start job for default target multi-user.target.
Dec 13 13:56:19.548137 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]"
Dec 13 13:56:21.203828 systemd[1]: Unnecessary job was removed for dev-vda6.device.
Dec 13 13:56:19.548406 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Dec 13 13:56:21.207324 systemd[1]: systemd-journald.service: Deactivated successfully.
Dec 13 13:56:19.548424 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Dec 13 13:56:21.322619 systemd[1]: Started systemd-journald.service.
Dec 13 13:56:19.548455 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12"
Dec 13 13:56:21.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:19.548464 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="skipped missing lower profile" missing profile=oem
Dec 13 13:56:19.548497 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory"
Dec 13 13:56:19.548508 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)=
Dec 13 13:56:19.548698 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack
Dec 13 13:56:19.548734 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json
Dec 13 13:56:19.548747 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json
Dec 13 13:56:19.549142 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10
Dec 13 13:56:19.549174 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl
Dec 13 13:56:19.549191 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6
Dec 13 13:56:19.549205 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store
Dec 13 13:56:19.549221 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6
Dec 13 13:56:19.549246 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:19Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store
Dec 13 13:56:20.962618 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:20Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Dec 13 13:56:20.962884 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:20Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Dec 13 13:56:20.962985 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:20Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Dec 13 13:56:20.963144 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:20Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl
Dec 13 13:56:20.963190 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:20Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile=
Dec 13 13:56:20.963264 /usr/lib/systemd/system-generators/torcx-generator[924]: time="2024-12-13T13:56:20Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx
Dec 13 13:56:21.325136 systemd[1]: Finished kmod-static-nodes.service.
Dec 13 13:56:21.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.326319 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Dec 13 13:56:21.326470 systemd[1]: Finished modprobe@configfs.service.
Dec 13 13:56:21.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.327337 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Dec 13 13:56:21.327495 systemd[1]: Finished modprobe@dm_mod.service.
Dec 13 13:56:21.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.328496 systemd[1]: modprobe@drm.service: Deactivated successfully.
Dec 13 13:56:21.328655 systemd[1]: Finished modprobe@drm.service.
Dec 13 13:56:21.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.329479 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Dec 13 13:56:21.329621 systemd[1]: Finished modprobe@efi_pstore.service.
Dec 13 13:56:21.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.330489 systemd[1]: modprobe@fuse.service: Deactivated successfully.
Dec 13 13:56:21.330633 systemd[1]: Finished modprobe@fuse.service.
Dec 13 13:56:21.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.331515 systemd[1]: modprobe@loop.service: Deactivated successfully.
Dec 13 13:56:21.331632 systemd[1]: Finished modprobe@loop.service.
Dec 13 13:56:21.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.332468 systemd[1]: Finished systemd-modules-load.service.
Dec 13 13:56:21.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.333374 systemd[1]: Finished systemd-network-generator.service.
Dec 13 13:56:21.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.334347 systemd[1]: Finished systemd-remount-fs.service.
Dec 13 13:56:21.335418 systemd[1]: Reached target network-pre.target.
Dec 13 13:56:21.337500 systemd[1]: Mounting sys-fs-fuse-connections.mount...
Dec 13 13:56:21.339115 systemd[1]: Mounting sys-kernel-config.mount...
Dec 13 13:56:21.339776 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/).
Dec 13 13:56:21.342361 systemd[1]: Starting systemd-hwdb-update.service...
Dec 13 13:56:21.343988 systemd[1]: Starting systemd-journal-flush.service...
Dec 13 13:56:21.344699 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Dec 13 13:56:21.345798 systemd[1]: Starting systemd-random-seed.service...
Dec 13 13:56:21.346563 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Dec 13 13:56:21.351373 systemd-journald[986]: Time spent on flushing to /var/log/journal/9587e49f8565403398c36de36bbc2b00 is 11.797ms for 967 entries.
Dec 13 13:56:21.351373 systemd-journald[986]: System Journal (/var/log/journal/9587e49f8565403398c36de36bbc2b00) is 8.0M, max 195.6M, 187.6M free.
Dec 13 13:56:21.377644 systemd-journald[986]: Received client request to flush runtime journal.
Dec 13 13:56:21.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.347680 systemd[1]: Starting systemd-sysctl.service...
Dec 13 13:56:21.350993 systemd[1]: Finished flatcar-tmpfiles.service.
Dec 13 13:56:21.352481 systemd[1]: Mounted sys-fs-fuse-connections.mount.
Dec 13 13:56:21.353452 systemd[1]: Mounted sys-kernel-config.mount.
Dec 13 13:56:21.378353 udevadm[1024]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in.
Dec 13 13:56:21.355191 systemd[1]: Starting systemd-sysusers.service...
Dec 13 13:56:21.356368 systemd[1]: Finished systemd-random-seed.service.
Dec 13 13:56:21.358156 systemd[1]: Reached target first-boot-complete.target.
Dec 13 13:56:21.361403 systemd[1]: Finished systemd-udev-trigger.service.
Dec 13 13:56:21.363070 systemd[1]: Starting systemd-udev-settle.service...
Dec 13 13:56:21.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.379569 systemd[1]: Finished systemd-journal-flush.service.
Dec 13 13:56:21.381328 systemd[1]: Finished systemd-sysctl.service.
Dec 13 13:56:21.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.382291 systemd[1]: Finished systemd-sysusers.service.
Dec 13 13:56:21.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.713746 systemd[1]: Finished systemd-hwdb-update.service.
Dec 13 13:56:21.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.714000 audit: BPF prog-id=18 op=LOAD
Dec 13 13:56:21.714000 audit: BPF prog-id=19 op=LOAD
Dec 13 13:56:21.714000 audit: BPF prog-id=7 op=UNLOAD
Dec 13 13:56:21.715000 audit: BPF prog-id=8 op=UNLOAD
Dec 13 13:56:21.716035 systemd[1]: Starting systemd-udevd.service...
Dec 13 13:56:21.735782 systemd-udevd[1027]: Using default interface naming scheme 'v252'.
Dec 13 13:56:21.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.747328 systemd[1]: Started systemd-udevd.service.
Dec 13 13:56:21.748000 audit: BPF prog-id=20 op=LOAD
Dec 13 13:56:21.749650 systemd[1]: Starting systemd-networkd.service...
Dec 13 13:56:21.761000 audit: BPF prog-id=21 op=LOAD
Dec 13 13:56:21.761000 audit: BPF prog-id=22 op=LOAD
Dec 13 13:56:21.761000 audit: BPF prog-id=23 op=LOAD
Dec 13 13:56:21.762533 systemd[1]: Starting systemd-userdbd.service...
Dec 13 13:56:21.773700 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped.
Dec 13 13:56:21.800178 systemd[1]: Started systemd-userdbd.service.
Dec 13 13:56:21.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.810566 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Dec 13 13:56:21.857598 systemd[1]: Finished systemd-udev-settle.service.
Dec 13 13:56:21.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.858905 systemd-networkd[1035]: lo: Link UP
Dec 13 13:56:21.858917 systemd-networkd[1035]: lo: Gained carrier
Dec 13 13:56:21.859602 systemd[1]: Starting lvm2-activation-early.service...
Dec 13 13:56:21.861091 systemd-networkd[1035]: Enumeration completed
Dec 13 13:56:21.861182 systemd[1]: Started systemd-networkd.service.
Dec 13 13:56:21.862101 systemd-networkd[1035]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Dec 13 13:56:21.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.865343 systemd-networkd[1035]: eth0: Link UP
Dec 13 13:56:21.865354 systemd-networkd[1035]: eth0: Gained carrier
Dec 13 13:56:21.877860 lvm[1060]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Dec 13 13:56:21.888370 systemd-networkd[1035]: eth0: DHCPv4 address 10.0.0.19/16, gateway 10.0.0.1 acquired from 10.0.0.1
Dec 13 13:56:21.914156 systemd[1]: Finished lvm2-activation-early.service.
Dec 13 13:56:21.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.915012 systemd[1]: Reached target cryptsetup.target.
Dec 13 13:56:21.916839 systemd[1]: Starting lvm2-activation.service...
Dec 13 13:56:21.920396 lvm[1061]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Dec 13 13:56:21.952211 systemd[1]: Finished lvm2-activation.service.
Dec 13 13:56:21.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.952981 systemd[1]: Reached target local-fs-pre.target.
Dec 13 13:56:21.953628 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw).
Dec 13 13:56:21.953656 systemd[1]: Reached target local-fs.target.
Dec 13 13:56:21.954217 systemd[1]: Reached target machines.target.
Dec 13 13:56:21.955993 systemd[1]: Starting ldconfig.service...
Dec 13 13:56:21.956905 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Dec 13 13:56:21.956961 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 13:56:21.957984 systemd[1]: Starting systemd-boot-update.service...
Dec 13 13:56:21.959759 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service...
Dec 13 13:56:21.961667 systemd[1]: Starting systemd-machine-id-commit.service...
Dec 13 13:56:21.964385 systemd[1]: Starting systemd-sysext.service...
Dec 13 13:56:21.965231 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1063 (bootctl)
Dec 13 13:56:21.966592 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service...
Dec 13 13:56:21.970135 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service.
Dec 13 13:56:21.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:21.980799 systemd[1]: Unmounting usr-share-oem.mount...
Dec 13 13:56:21.984434 systemd[1]: usr-share-oem.mount: Deactivated successfully.
Dec 13 13:56:21.984621 systemd[1]: Unmounted usr-share-oem.mount.
Dec 13 13:56:21.994263 kernel: loop0: detected capacity change from 0 to 194096
Dec 13 13:56:22.034255 systemd[1]: etc-machine\x2did.mount: Deactivated successfully.
Dec 13 13:56:22.034840 systemd[1]: Finished systemd-machine-id-commit.service.
Dec 13 13:56:22.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.040078 systemd-fsck[1070]: fsck.fat 4.2 (2021-01-31)
Dec 13 13:56:22.040078 systemd-fsck[1070]: /dev/vda1: 236 files, 117175/258078 clusters
Dec 13 13:56:22.043310 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher
Dec 13 13:56:22.046589 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service.
Dec 13 13:56:22.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.048728 systemd[1]: Mounting boot.mount...
Dec 13 13:56:22.056156 systemd[1]: Mounted boot.mount.
Dec 13 13:56:22.061293 kernel: loop1: detected capacity change from 0 to 194096
Dec 13 13:56:22.064032 systemd[1]: Finished systemd-boot-update.service.
Dec 13 13:56:22.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.067523 (sd-sysext)[1076]: Using extensions 'kubernetes'.
Dec 13 13:56:22.068327 (sd-sysext)[1076]: Merged extensions into '/usr'.
Dec 13 13:56:22.085987 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Dec 13 13:56:22.087549 systemd[1]: Starting modprobe@dm_mod.service...
Dec 13 13:56:22.089781 systemd[1]: Starting modprobe@efi_pstore.service...
Dec 13 13:56:22.091559 systemd[1]: Starting modprobe@loop.service...
Dec 13 13:56:22.092361 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Dec 13 13:56:22.092495 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 13:56:22.093264 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Dec 13 13:56:22.093393 systemd[1]: Finished modprobe@dm_mod.service.
Dec 13 13:56:22.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.094584 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Dec 13 13:56:22.094700 systemd[1]: Finished modprobe@efi_pstore.service.
Dec 13 13:56:22.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.095942 systemd[1]: modprobe@loop.service: Deactivated successfully.
Dec 13 13:56:22.096053 systemd[1]: Finished modprobe@loop.service.
Dec 13 13:56:22.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.097207 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Dec 13 13:56:22.097360 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Dec 13 13:56:22.129209 ldconfig[1062]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start.
Dec 13 13:56:22.132920 systemd[1]: Finished ldconfig.service.
Dec 13 13:56:22.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.316385 systemd[1]: Mounting usr-share-oem.mount...
Dec 13 13:56:22.321209 systemd[1]: Mounted usr-share-oem.mount.
Dec 13 13:56:22.322892 systemd[1]: Finished systemd-sysext.service.
Dec 13 13:56:22.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.324768 systemd[1]: Starting ensure-sysext.service...
Dec 13 13:56:22.326278 systemd[1]: Starting systemd-tmpfiles-setup.service...
Dec 13 13:56:22.330530 systemd[1]: Reloading.
Dec 13 13:56:22.341569 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring.
Dec 13 13:56:22.345253 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring.
Dec 13 13:56:22.348053 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring.
Dec 13 13:56:22.372280 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-12-13T13:56:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]"
Dec 13 13:56:22.372310 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2024-12-13T13:56:22Z" level=info msg="torcx already run"
Dec 13 13:56:22.441329 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Dec 13 13:56:22.441341 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Dec 13 13:56:22.457338 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Dec 13 13:56:22.501000 audit: BPF prog-id=24 op=LOAD
Dec 13 13:56:22.501000 audit: BPF prog-id=25 op=LOAD
Dec 13 13:56:22.501000 audit: BPF prog-id=18 op=UNLOAD
Dec 13 13:56:22.501000 audit: BPF prog-id=19 op=UNLOAD
Dec 13 13:56:22.502000 audit: BPF prog-id=26 op=LOAD
Dec 13 13:56:22.502000 audit: BPF prog-id=20 op=UNLOAD
Dec 13 13:56:22.503000 audit: BPF prog-id=27 op=LOAD
Dec 13 13:56:22.503000 audit: BPF prog-id=15 op=UNLOAD
Dec 13 13:56:22.503000 audit: BPF prog-id=28 op=LOAD
Dec 13 13:56:22.503000 audit: BPF prog-id=29 op=LOAD
Dec 13 13:56:22.503000 audit: BPF prog-id=16 op=UNLOAD
Dec 13 13:56:22.503000 audit: BPF prog-id=17 op=UNLOAD
Dec 13 13:56:22.503000 audit: BPF prog-id=30 op=LOAD
Dec 13 13:56:22.503000 audit: BPF prog-id=21 op=UNLOAD
Dec 13 13:56:22.504000 audit: BPF prog-id=31 op=LOAD
Dec 13 13:56:22.504000 audit: BPF prog-id=32 op=LOAD
Dec 13 13:56:22.504000 audit: BPF prog-id=22 op=UNLOAD
Dec 13 13:56:22.504000 audit: BPF prog-id=23 op=UNLOAD
Dec 13 13:56:22.506154 systemd[1]: Finished systemd-tmpfiles-setup.service.
Dec 13 13:56:22.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.510493 systemd[1]: Starting audit-rules.service...
Dec 13 13:56:22.512475 systemd[1]: Starting clean-ca-certificates.service...
Dec 13 13:56:22.514363 systemd[1]: Starting systemd-journal-catalog-update.service...
Dec 13 13:56:22.516000 audit: BPF prog-id=33 op=LOAD
Dec 13 13:56:22.518000 audit: BPF prog-id=34 op=LOAD
Dec 13 13:56:22.517738 systemd[1]: Starting systemd-resolved.service...
Dec 13 13:56:22.520178 systemd[1]: Starting systemd-timesyncd.service...
Dec 13 13:56:22.522379 systemd[1]: Starting systemd-update-utmp.service...
Dec 13 13:56:22.523557 systemd[1]: Finished clean-ca-certificates.service.
Dec 13 13:56:22.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.526473 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Dec 13 13:56:22.528000 audit[1153]: SYSTEM_BOOT pid=1153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.532938 systemd[1]: Finished systemd-journal-catalog-update.service.
Dec 13 13:56:22.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.535744 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Dec 13 13:56:22.536982 systemd[1]: Starting modprobe@dm_mod.service...
Dec 13 13:56:22.538636 systemd[1]: Starting modprobe@efi_pstore.service...
Dec 13 13:56:22.540223 systemd[1]: Starting modprobe@loop.service...
Dec 13 13:56:22.540883 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Dec 13 13:56:22.541009 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 13:56:22.542183 systemd[1]: Starting systemd-update-done.service...
Dec 13 13:56:22.543140 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Dec 13 13:56:22.544109 systemd[1]: Finished systemd-update-utmp.service.
Dec 13 13:56:22.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.545286 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Dec 13 13:56:22.545399 systemd[1]: Finished modprobe@dm_mod.service.
Dec 13 13:56:22.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.546450 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Dec 13 13:56:22.546562 systemd[1]: Finished modprobe@efi_pstore.service.
Dec 13 13:56:22.547618 systemd[1]: modprobe@loop.service: Deactivated successfully.
Dec 13 13:56:22.547731 systemd[1]: Finished modprobe@loop.service.
Dec 13 13:56:22.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.550657 systemd[1]: Finished systemd-update-done.service.
Dec 13 13:56:22.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.551917 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Dec 13 13:56:22.553059 systemd[1]: Starting modprobe@dm_mod.service...
Dec 13 13:56:22.554801 systemd[1]: Starting modprobe@efi_pstore.service...
Dec 13 13:56:22.556674 systemd[1]: Starting modprobe@loop.service...
Dec 13 13:56:22.557311 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Dec 13 13:56:22.557432 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 13:56:22.557522 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Dec 13 13:56:22.558389 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Dec 13 13:56:22.558530 systemd[1]: Finished modprobe@dm_mod.service.
Dec 13 13:56:22.559550 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Dec 13 13:56:22.559661 systemd[1]: Finished modprobe@efi_pstore.service.
Dec 13 13:56:22.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.560653 systemd[1]: modprobe@loop.service: Deactivated successfully.
Dec 13 13:56:22.560765 systemd[1]: Finished modprobe@loop.service.
Dec 13 13:56:22.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.562046 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Dec 13 13:56:22.562138 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Dec 13 13:56:22.564395 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Dec 13 13:56:22.565551 systemd[1]: Starting modprobe@dm_mod.service...
Dec 13 13:56:22.567343 systemd[1]: Starting modprobe@drm.service...
Dec 13 13:56:22.569064 systemd[1]: Starting modprobe@efi_pstore.service...
Dec 13 13:56:22.570787 systemd[1]: Starting modprobe@loop.service...
Dec 13 13:56:22.571734 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Dec 13 13:56:22.571864 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 13:56:22.573036 systemd[1]: Starting systemd-networkd-wait-online.service...
Dec 13 13:56:22.574038 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Dec 13 13:56:22.575014 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Dec 13 13:56:22.575133 systemd[1]: Finished modprobe@dm_mod.service.
Dec 13 13:56:22.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:22.578294 systemd[1]: modprobe@drm.service: Deactivated successfully.
Dec 13 13:56:22.578418 systemd[1]: Finished modprobe@drm.service.
Dec 13 13:56:22.578000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1
Dec 13 13:56:22.578000 audit[1175]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc2ef0560 a2=420 a3=0 items=0 ppid=1142 pid=1175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:22.578000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573
Dec 13 13:56:22.579299 augenrules[1175]: No rules
Dec 13 13:56:22.578870 systemd-resolved[1146]: Positive Trust Anchors:
Dec 13 13:56:22.578879 systemd-resolved[1146]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Dec 13 13:56:22.578905 systemd-resolved[1146]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Dec 13 13:56:22.580861 systemd[1]: Finished audit-rules.service.
Dec 13 13:56:22.583428 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Dec 13 13:56:22.583563 systemd[1]: Finished modprobe@efi_pstore.service.
Dec 13 13:56:22.585626 systemd[1]: Started systemd-timesyncd.service.
Dec 13 13:56:22.586585 systemd-timesyncd[1147]: Contacted time server 10.0.0.1:123 (10.0.0.1).
Dec 13 13:56:22.586883 systemd-timesyncd[1147]: Initial clock synchronization to Fri 2024-12-13 13:56:22.356215 UTC.
Dec 13 13:56:22.587286 systemd[1]: modprobe@loop.service: Deactivated successfully.
Dec 13 13:56:22.587420 systemd[1]: Finished modprobe@loop.service.
Dec 13 13:56:22.588744 systemd[1]: Reached target time-set.target.
Dec 13 13:56:22.589476 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Dec 13 13:56:22.589523 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Dec 13 13:56:22.590667 systemd[1]: Finished ensure-sysext.service.
Dec 13 13:56:22.591616 systemd-resolved[1146]: Defaulting to hostname 'linux'.
Dec 13 13:56:22.593041 systemd[1]: Started systemd-resolved.service.
Dec 13 13:56:22.593727 systemd[1]: Reached target network.target.
Dec 13 13:56:22.594311 systemd[1]: Reached target nss-lookup.target.
Dec 13 13:56:22.594888 systemd[1]: Reached target sysinit.target.
Dec 13 13:56:22.595574 systemd[1]: Started motdgen.path.
Dec 13 13:56:22.596118 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path.
Dec 13 13:56:22.597152 systemd[1]: Started logrotate.timer.
Dec 13 13:56:22.597820 systemd[1]: Started mdadm.timer.
Dec 13 13:56:22.598338 systemd[1]: Started systemd-tmpfiles-clean.timer.
Dec 13 13:56:22.598938 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate).
Dec 13 13:56:22.598967 systemd[1]: Reached target paths.target.
Dec 13 13:56:22.599504 systemd[1]: Reached target timers.target.
Dec 13 13:56:22.600377 systemd[1]: Listening on dbus.socket.
Dec 13 13:56:22.602011 systemd[1]: Starting docker.socket...
Dec 13 13:56:22.605339 systemd[1]: Listening on sshd.socket.
Dec 13 13:56:22.606029 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 13:56:22.606484 systemd[1]: Listening on docker.socket.
Dec 13 13:56:22.607150 systemd[1]: Reached target sockets.target.
Dec 13 13:56:22.607750 systemd[1]: Reached target basic.target.
Dec 13 13:56:22.608338 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met.
Dec 13 13:56:22.608372 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met.
Dec 13 13:56:22.609455 systemd[1]: Starting containerd.service...
Dec 13 13:56:22.611063 systemd[1]: Starting dbus.service...
Dec 13 13:56:22.612781 systemd[1]: Starting enable-oem-cloudinit.service...
Dec 13 13:56:22.614638 systemd[1]: Starting extend-filesystems.service...
Dec 13 13:56:22.615586 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment).
Dec 13 13:56:22.619931 systemd[1]: Starting motdgen.service...
Dec 13 13:56:22.621890 systemd[1]: Starting ssh-key-proc-cmdline.service...
Dec 13 13:56:22.623802 systemd[1]: Starting sshd-keygen.service...
Dec 13 13:56:22.626465 systemd[1]: Starting systemd-logind.service...
Dec 13 13:56:22.627197 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Dec 13 13:56:22.627363 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0).
Dec 13 13:56:22.627877 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details.
Dec 13 13:56:22.628622 systemd[1]: Starting update-engine.service...
Dec 13 13:56:22.629418 jq[1185]: false
Dec 13 13:56:22.630775 systemd[1]: Starting update-ssh-keys-after-ignition.service...
Dec 13 13:56:22.633406 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'.
Dec 13 13:56:22.633608 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped.
Dec 13 13:56:22.634041 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully.
Dec 13 13:56:22.634204 systemd[1]: Finished ssh-key-proc-cmdline.service.
Dec 13 13:56:22.637293 jq[1198]: true
Dec 13 13:56:22.642156 systemd[1]: motdgen.service: Deactivated successfully.
Dec 13 13:56:22.642343 systemd[1]: Finished motdgen.service.
Dec 13 13:56:22.655041 dbus-daemon[1184]: [system] SELinux support is enabled
Dec 13 13:56:22.655272 systemd[1]: Started dbus.service.
Dec 13 13:56:22.657328 jq[1204]: true
Dec 13 13:56:22.658840 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml).
Dec 13 13:56:22.658886 systemd[1]: Reached target system-config.target.
Dec 13 13:56:22.659587 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url).
Dec 13 13:56:22.659612 systemd[1]: Reached target user-config.target.
Dec 13 13:56:22.660077 extend-filesystems[1186]: Found loop1
Dec 13 13:56:22.661119 extend-filesystems[1186]: Found vda
Dec 13 13:56:22.661119 extend-filesystems[1186]: Found vda1
Dec 13 13:56:22.661119 extend-filesystems[1186]: Found vda2
Dec 13 13:56:22.661119 extend-filesystems[1186]: Found vda3
Dec 13 13:56:22.661119 extend-filesystems[1186]: Found usr
Dec 13 13:56:22.661119 extend-filesystems[1186]: Found vda4
Dec 13 13:56:22.661119 extend-filesystems[1186]: Found vda6
Dec 13 13:56:22.661119 extend-filesystems[1186]: Found vda7
Dec 13 13:56:22.661119 extend-filesystems[1186]: Found vda9
Dec 13 13:56:22.661119 extend-filesystems[1186]: Checking size of /dev/vda9
Dec 13 13:56:22.691533 extend-filesystems[1186]: Resized partition /dev/vda9
Dec 13 13:56:22.708313 extend-filesystems[1231]: resize2fs 1.46.5 (30-Dec-2021)
Dec 13 13:56:22.717115 systemd-logind[1194]: Watching system buttons on /dev/input/event0 (Power Button)
Dec 13 13:56:22.717352 systemd-logind[1194]: New seat seat0.
Dec 13 13:56:22.718264 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks
Dec 13 13:56:22.727483 systemd[1]: Started systemd-logind.service.
Dec 13 13:56:22.732159 update_engine[1197]: I1213 13:56:22.731906  1197 main.cc:92] Flatcar Update Engine starting
Dec 13 13:56:22.752976 update_engine[1197]: I1213 13:56:22.739048  1197 update_check_scheduler.cc:74] Next update check in 9m43s
Dec 13 13:56:22.739019 systemd[1]: Started update-engine.service.
Dec 13 13:56:22.742120 systemd[1]: Started locksmithd.service.
Dec 13 13:56:22.754749 env[1206]: time="2024-12-13T13:56:22.754697880Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16
Dec 13 13:56:22.767258 kernel: EXT4-fs (vda9): resized filesystem to 1864699
Dec 13 13:56:22.768414 bash[1230]: Updated "/home/core/.ssh/authorized_keys"
Dec 13 13:56:22.785296 env[1206]: time="2024-12-13T13:56:22.775275640Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1
Dec 13 13:56:22.769470 systemd[1]: Finished update-ssh-keys-after-ignition.service.
Dec 13 13:56:22.785423 extend-filesystems[1231]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required
Dec 13 13:56:22.785423 extend-filesystems[1231]: old_desc_blocks = 1, new_desc_blocks = 1
Dec 13 13:56:22.785423 extend-filesystems[1231]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long.
Dec 13 13:56:22.789093 env[1206]: time="2024-12-13T13:56:22.785309360Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1
Dec 13 13:56:22.789093 env[1206]: time="2024-12-13T13:56:22.788566800Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1
Dec 13 13:56:22.789093 env[1206]: time="2024-12-13T13:56:22.788595320Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1
Dec 13 13:56:22.789093 env[1206]: time="2024-12-13T13:56:22.788980320Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Dec 13 13:56:22.789093 env[1206]: time="2024-12-13T13:56:22.789003920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1
Dec 13 13:56:22.789093 env[1206]: time="2024-12-13T13:56:22.789017560Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured"
Dec 13 13:56:22.789093 env[1206]: time="2024-12-13T13:56:22.789026680Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1
Dec 13 13:56:22.786574 systemd[1]: extend-filesystems.service: Deactivated successfully.
Dec 13 13:56:22.789472 extend-filesystems[1186]: Resized filesystem in /dev/vda9
Dec 13 13:56:22.790559 env[1206]: time="2024-12-13T13:56:22.789110800Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1
Dec 13 13:56:22.790559 env[1206]: time="2024-12-13T13:56:22.789366440Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1
Dec 13 13:56:22.790559 env[1206]: time="2024-12-13T13:56:22.789501280Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Dec 13 13:56:22.790559 env[1206]: time="2024-12-13T13:56:22.789516840Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1
Dec 13 13:56:22.790559 env[1206]: time="2024-12-13T13:56:22.789571160Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured"
Dec 13 13:56:22.790559 env[1206]: time="2024-12-13T13:56:22.789584440Z" level=info msg="metadata content store policy set" policy=shared
Dec 13 13:56:22.786740 systemd[1]: Finished extend-filesystems.service.
Dec 13 13:56:22.793495 env[1206]: time="2024-12-13T13:56:22.793459520Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1
Dec 13 13:56:22.793495 env[1206]: time="2024-12-13T13:56:22.793495360Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1
Dec 13 13:56:22.793576 env[1206]: time="2024-12-13T13:56:22.793509960Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1
Dec 13 13:56:22.793576 env[1206]: time="2024-12-13T13:56:22.793552480Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1
Dec 13 13:56:22.793576 env[1206]: time="2024-12-13T13:56:22.793569600Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1
Dec 13 13:56:22.793645 env[1206]: time="2024-12-13T13:56:22.793583520Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1
Dec 13 13:56:22.793679 env[1206]: time="2024-12-13T13:56:22.793663040Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1
Dec 13 13:56:22.794084 env[1206]: time="2024-12-13T13:56:22.794055640Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1
Dec 13 13:56:22.794084 env[1206]: time="2024-12-13T13:56:22.794081360Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1
Dec 13 13:56:22.794136 env[1206]: time="2024-12-13T13:56:22.794096760Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1
Dec 13 13:56:22.794136 env[1206]: time="2024-12-13T13:56:22.794110600Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1
Dec 13 13:56:22.794136 env[1206]: time="2024-12-13T13:56:22.794130880Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1
Dec 13 13:56:22.794304 env[1206]: time="2024-12-13T13:56:22.794277560Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2
Dec 13 13:56:22.794437 env[1206]: time="2024-12-13T13:56:22.794370800Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1
Dec 13 13:56:22.794711 env[1206]: time="2024-12-13T13:56:22.794659040Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1
Dec 13 13:56:22.794711 env[1206]: time="2024-12-13T13:56:22.794699760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1
Dec 13 13:56:22.794772 env[1206]: time="2024-12-13T13:56:22.794713840Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1
Dec 13 13:56:22.794945 env[1206]: time="2024-12-13T13:56:22.794931600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1
Dec 13 13:56:22.794968 env[1206]: time="2024-12-13T13:56:22.794949600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1
Dec 13 13:56:22.794968 env[1206]: time="2024-12-13T13:56:22.794964200Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1
Dec 13 13:56:22.795040 env[1206]: time="2024-12-13T13:56:22.794976240Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1
Dec 13 13:56:22.795066 env[1206]: time="2024-12-13T13:56:22.795047000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1
Dec 13 13:56:22.795066 env[1206]: time="2024-12-13T13:56:22.795060680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1
Dec 13 13:56:22.795115 env[1206]: time="2024-12-13T13:56:22.795075760Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1
Dec 13 13:56:22.795115 env[1206]: time="2024-12-13T13:56:22.795088000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1
Dec 13 13:56:22.795115 env[1206]: time="2024-12-13T13:56:22.795107400Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1
Dec 13 13:56:22.795270 env[1206]: time="2024-12-13T13:56:22.795254600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1
Dec 13 13:56:22.795294 env[1206]: time="2024-12-13T13:56:22.795277400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1
Dec 13 13:56:22.795294 env[1206]: time="2024-12-13T13:56:22.795290160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1
Dec 13 13:56:22.795331 env[1206]: time="2024-12-13T13:56:22.795301720Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1
Dec 13 13:56:22.795331 env[1206]: time="2024-12-13T13:56:22.795322280Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1
Dec 13 13:56:22.795375 env[1206]: time="2024-12-13T13:56:22.795333760Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1
Dec 13 13:56:22.795375 env[1206]: time="2024-12-13T13:56:22.795351360Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin"
Dec 13 13:56:22.795413 env[1206]: time="2024-12-13T13:56:22.795385000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1
Dec 13 13:56:22.795653 env[1206]: time="2024-12-13T13:56:22.795596320Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}"
Dec 13 13:56:22.796662 env[1206]: time="2024-12-13T13:56:22.795667360Z" level=info msg="Connect containerd service"
Dec 13 13:56:22.796662 env[1206]: time="2024-12-13T13:56:22.795704840Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\""
Dec 13 13:56:22.796662 env[1206]: time="2024-12-13T13:56:22.796605440Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Dec 13 13:56:22.796830 env[1206]: time="2024-12-13T13:56:22.796792320Z" level=info msg="Start subscribing containerd event"
Dec 13 13:56:22.796856 env[1206]: time="2024-12-13T13:56:22.796843520Z" level=info msg="Start recovering state"
Dec 13 13:56:22.796912 env[1206]: time="2024-12-13T13:56:22.796900800Z" level=info msg="Start event monitor"
Dec 13 13:56:22.796934 env[1206]: time="2024-12-13T13:56:22.796922120Z" level=info msg="Start snapshots syncer"
Dec 13 13:56:22.796934 env[1206]: time="2024-12-13T13:56:22.796931080Z" level=info msg="Start cni network conf syncer for default"
Dec 13 13:56:22.796987 env[1206]: time="2024-12-13T13:56:22.796938480Z" level=info msg="Start streaming server"
Dec 13 13:56:22.797429 env[1206]: time="2024-12-13T13:56:22.797383440Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc
Dec 13 13:56:22.797463 env[1206]: time="2024-12-13T13:56:22.797449440Z" level=info msg=serving... address=/run/containerd/containerd.sock
Dec 13 13:56:22.797615 systemd[1]: Started containerd.service.
Dec 13 13:56:22.801626 env[1206]: time="2024-12-13T13:56:22.801390160Z" level=info msg="containerd successfully booted in 0.060418s"
Dec 13 13:56:22.806081 locksmithd[1233]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot"
Dec 13 13:56:23.806410 systemd-networkd[1035]: eth0: Gained IPv6LL
Dec 13 13:56:23.808305 systemd[1]: Finished systemd-networkd-wait-online.service.
Dec 13 13:56:23.809275 systemd[1]: Reached target network-online.target.
Dec 13 13:56:23.813350 systemd[1]: Starting kubelet.service...
Dec 13 13:56:24.323178 systemd[1]: Started kubelet.service.
Dec 13 13:56:24.781983 kubelet[1247]: E1213 13:56:24.781881    1247 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory"
Dec 13 13:56:24.783815 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Dec 13 13:56:24.783947 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Dec 13 13:56:24.972899 sshd_keygen[1205]: ssh-keygen: generating new host keys: RSA ECDSA ED25519
Dec 13 13:56:24.989650 systemd[1]: Finished sshd-keygen.service.
Dec 13 13:56:24.991751 systemd[1]: Starting issuegen.service...
Dec 13 13:56:24.996197 systemd[1]: issuegen.service: Deactivated successfully.
Dec 13 13:56:24.996372 systemd[1]: Finished issuegen.service.
Dec 13 13:56:24.998482 systemd[1]: Starting systemd-user-sessions.service...
Dec 13 13:56:25.004247 systemd[1]: Finished systemd-user-sessions.service.
Dec 13 13:56:25.006402 systemd[1]: Started getty@tty1.service.
Dec 13 13:56:25.008337 systemd[1]: Started serial-getty@ttyAMA0.service.
Dec 13 13:56:25.009164 systemd[1]: Reached target getty.target.
Dec 13 13:56:25.009861 systemd[1]: Reached target multi-user.target.
Dec 13 13:56:25.011624 systemd[1]: Starting systemd-update-utmp-runlevel.service...
Dec 13 13:56:25.018120 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully.
Dec 13 13:56:25.018289 systemd[1]: Finished systemd-update-utmp-runlevel.service.
Dec 13 13:56:25.019091 systemd[1]: Startup finished in 564ms (kernel) + 3.836s (initrd) + 5.611s (userspace) = 10.011s.
Dec 13 13:56:28.102936 systemd[1]: Created slice system-sshd.slice.
Dec 13 13:56:28.104254 systemd[1]: Started sshd@0-10.0.0.19:22-10.0.0.1:56734.service.
Dec 13 13:56:28.146105 sshd[1271]: Accepted publickey for core from 10.0.0.1 port 56734 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0
Dec 13 13:56:28.148480 sshd[1271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 13:56:28.156277 systemd[1]: Created slice user-500.slice.
Dec 13 13:56:28.157382 systemd[1]: Starting user-runtime-dir@500.service...
Dec 13 13:56:28.159300 systemd-logind[1194]: New session 1 of user core.
Dec 13 13:56:28.166996 systemd[1]: Finished user-runtime-dir@500.service.
Dec 13 13:56:28.168380 systemd[1]: Starting user@500.service...
Dec 13 13:56:28.172844 (systemd)[1274]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0)
Dec 13 13:56:28.232169 systemd[1274]: Queued start job for default target default.target.
Dec 13 13:56:28.232688 systemd[1274]: Reached target paths.target.
Dec 13 13:56:28.232707 systemd[1274]: Reached target sockets.target.
Dec 13 13:56:28.232718 systemd[1274]: Reached target timers.target.
Dec 13 13:56:28.232728 systemd[1274]: Reached target basic.target.
Dec 13 13:56:28.232779 systemd[1274]: Reached target default.target.
Dec 13 13:56:28.232805 systemd[1274]: Startup finished in 54ms.
Dec 13 13:56:28.232866 systemd[1]: Started user@500.service.
Dec 13 13:56:28.233832 systemd[1]: Started session-1.scope.
Dec 13 13:56:28.283606 systemd[1]: Started sshd@1-10.0.0.19:22-10.0.0.1:56750.service.
Dec 13 13:56:28.315566 sshd[1283]: Accepted publickey for core from 10.0.0.1 port 56750 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0
Dec 13 13:56:28.317119 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 13:56:28.320716 systemd-logind[1194]: New session 2 of user core.
Dec 13 13:56:28.321865 systemd[1]: Started session-2.scope.
Dec 13 13:56:28.380881 sshd[1283]: pam_unix(sshd:session): session closed for user core
Dec 13 13:56:28.383391 systemd[1]: sshd@1-10.0.0.19:22-10.0.0.1:56750.service: Deactivated successfully.
Dec 13 13:56:28.383932 systemd[1]: session-2.scope: Deactivated successfully.
Dec 13 13:56:28.384490 systemd-logind[1194]: Session 2 logged out. Waiting for processes to exit.
Dec 13 13:56:28.385580 systemd[1]: Started sshd@2-10.0.0.19:22-10.0.0.1:56766.service.
Dec 13 13:56:28.386359 systemd-logind[1194]: Removed session 2.
Dec 13 13:56:28.417594 sshd[1289]: Accepted publickey for core from 10.0.0.1 port 56766 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0
Dec 13 13:56:28.418657 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 13:56:28.421740 systemd-logind[1194]: New session 3 of user core.
Dec 13 13:56:28.422510 systemd[1]: Started session-3.scope.
Dec 13 13:56:28.471283 sshd[1289]: pam_unix(sshd:session): session closed for user core
Dec 13 13:56:28.475359 systemd[1]: sshd@2-10.0.0.19:22-10.0.0.1:56766.service: Deactivated successfully.
Dec 13 13:56:28.476160 systemd[1]: session-3.scope: Deactivated successfully.
Dec 13 13:56:28.476923 systemd-logind[1194]: Session 3 logged out. Waiting for processes to exit.
Dec 13 13:56:28.477954 systemd-logind[1194]: Removed session 3.
Dec 13 13:56:28.479626 systemd[1]: Started sshd@3-10.0.0.19:22-10.0.0.1:56778.service.
Dec 13 13:56:28.514283 sshd[1295]: Accepted publickey for core from 10.0.0.1 port 56778 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0
Dec 13 13:56:28.515352 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 13:56:28.518407 systemd-logind[1194]: New session 4 of user core.
Dec 13 13:56:28.520691 systemd[1]: Started session-4.scope.
Dec 13 13:56:28.573933 sshd[1295]: pam_unix(sshd:session): session closed for user core
Dec 13 13:56:28.578118 systemd[1]: sshd@3-10.0.0.19:22-10.0.0.1:56778.service: Deactivated successfully.
Dec 13 13:56:28.578944 systemd[1]: session-4.scope: Deactivated successfully.
Dec 13 13:56:28.579711 systemd-logind[1194]: Session 4 logged out. Waiting for processes to exit.
Dec 13 13:56:28.581324 systemd[1]: Started sshd@4-10.0.0.19:22-10.0.0.1:56784.service.
Dec 13 13:56:28.582465 systemd-logind[1194]: Removed session 4.
Dec 13 13:56:28.614216 sshd[1301]: Accepted publickey for core from 10.0.0.1 port 56784 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0
Dec 13 13:56:28.615375 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 13:56:28.618795 systemd-logind[1194]: New session 5 of user core.
Dec 13 13:56:28.620730 systemd[1]: Started session-5.scope.
Dec 13 13:56:28.677459 sudo[1304]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1
Dec 13 13:56:28.677672 sudo[1304]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Dec 13 13:56:28.695384 dbus-daemon[1184]: avc:  received setenforce notice (enforcing=1)
Dec 13 13:56:28.696276 sudo[1304]: pam_unix(sudo:session): session closed for user root
Dec 13 13:56:28.698491 sshd[1301]: pam_unix(sshd:session): session closed for user core
Dec 13 13:56:28.701867 systemd[1]: Started sshd@5-10.0.0.19:22-10.0.0.1:56794.service.
Dec 13 13:56:28.702374 systemd[1]: sshd@4-10.0.0.19:22-10.0.0.1:56784.service: Deactivated successfully.
Dec 13 13:56:28.703033 systemd[1]: session-5.scope: Deactivated successfully.
Dec 13 13:56:28.703567 systemd-logind[1194]: Session 5 logged out. Waiting for processes to exit.
Dec 13 13:56:28.704299 systemd-logind[1194]: Removed session 5.
Dec 13 13:56:28.735646 sshd[1307]: Accepted publickey for core from 10.0.0.1 port 56794 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0
Dec 13 13:56:28.737264 sshd[1307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 13:56:28.743457 systemd-logind[1194]: New session 6 of user core.
Dec 13 13:56:28.744267 systemd[1]: Started session-6.scope.
Dec 13 13:56:28.795421 sudo[1312]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules
Dec 13 13:56:28.795636 sudo[1312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Dec 13 13:56:28.798289 sudo[1312]: pam_unix(sudo:session): session closed for user root
Dec 13 13:56:28.802886 sudo[1311]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules
Dec 13 13:56:28.803102 sudo[1311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Dec 13 13:56:28.811637 systemd[1]: Stopping audit-rules.service...
Dec 13 13:56:28.811000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Dec 13 13:56:28.813061 auditctl[1315]: No rules
Dec 13 13:56:28.813323 kernel: kauditd_printk_skb: 106 callbacks suppressed
Dec 13 13:56:28.813354 kernel: audit: type=1305 audit(1734098188.811:196): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Dec 13 13:56:28.813468 systemd[1]: audit-rules.service: Deactivated successfully.
Dec 13 13:56:28.813622 systemd[1]: Stopped audit-rules.service.
Dec 13 13:56:28.811000 audit[1315]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe37f9c50 a2=420 a3=0 items=0 ppid=1 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:28.815111 systemd[1]: Starting audit-rules.service...
Dec 13 13:56:28.817160 kernel: audit: type=1300 audit(1734098188.811:196): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe37f9c50 a2=420 a3=0 items=0 ppid=1 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:28.817210 kernel: audit: type=1327 audit(1734098188.811:196): proctitle=2F7362696E2F617564697463746C002D44
Dec 13 13:56:28.811000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44
Dec 13 13:56:28.817942 kernel: audit: type=1131 audit(1734098188.812:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:28.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:28.831348 augenrules[1332]: No rules
Dec 13 13:56:28.832063 systemd[1]: Finished audit-rules.service.
Dec 13 13:56:28.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:28.834270 kernel: audit: type=1130 audit(1734098188.831:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:28.834405 sudo[1311]: pam_unix(sudo:session): session closed for user root
Dec 13 13:56:28.833000 audit[1311]: USER_END pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:28.835954 sshd[1307]: pam_unix(sshd:session): session closed for user core
Dec 13 13:56:28.833000 audit[1311]: CRED_DISP pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:28.839478 systemd[1]: Started sshd@6-10.0.0.19:22-10.0.0.1:56808.service.
Dec 13 13:56:28.839797 kernel: audit: type=1106 audit(1734098188.833:199): pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:28.839837 kernel: audit: type=1104 audit(1734098188.833:200): pid=1311 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:28.839866 kernel: audit: type=1106 audit(1734098188.833:201): pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 13:56:28.833000 audit[1307]: USER_END pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 13:56:28.839966 systemd[1]: sshd@5-10.0.0.19:22-10.0.0.1:56794.service: Deactivated successfully.
Dec 13 13:56:28.840570 systemd[1]: session-6.scope: Deactivated successfully.
Dec 13 13:56:28.841117 systemd-logind[1194]: Session 6 logged out. Waiting for processes to exit.
Dec 13 13:56:28.842055 systemd-logind[1194]: Removed session 6.
Dec 13 13:56:28.842434 kernel: audit: type=1104 audit(1734098188.833:202): pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 13:56:28.833000 audit[1307]: CRED_DISP pid=1307 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 13:56:28.844400 kernel: audit: type=1130 audit(1734098188.837:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.19:22-10.0.0.1:56808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:28.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.19:22-10.0.0.1:56808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:28.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.19:22-10.0.0.1:56794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:28.872686 sshd[1337]: Accepted publickey for core from 10.0.0.1 port 56808 ssh2: RSA SHA256:/HJyHm5Z3TKV0xVrRefgtheJNUHxRnoHBht1EzpqsE0
Dec 13 13:56:28.872000 audit[1337]: USER_ACCT pid=1337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 13:56:28.872000 audit[1337]: CRED_ACQ pid=1337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 13:56:28.872000 audit[1337]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd508e830 a2=3 a3=1 items=0 ppid=1 pid=1337 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:28.872000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Dec 13 13:56:28.874041 sshd[1337]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Dec 13 13:56:28.878063 systemd[1]: Started session-7.scope.
Dec 13 13:56:28.878406 systemd-logind[1194]: New session 7 of user core.
Dec 13 13:56:28.881000 audit[1337]: USER_START pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 13:56:28.882000 audit[1340]: CRED_ACQ pid=1340 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 13:56:28.929000 audit[1341]: USER_ACCT pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:28.930188 sudo[1341]:     core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh
Dec 13 13:56:28.930000 audit[1341]: CRED_REFR pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:28.930702 sudo[1341]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Dec 13 13:56:28.932000 audit[1341]: USER_START pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:28.942061 systemd[1]: Starting coreos-metadata.service...
Dec 13 13:56:28.948559 systemd[1]: coreos-metadata.service: Deactivated successfully.
Dec 13 13:56:28.948740 systemd[1]: Finished coreos-metadata.service.
Dec 13 13:56:28.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:28.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:29.434690 systemd[1]: Stopped kubelet.service.
Dec 13 13:56:29.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:29.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:29.436782 systemd[1]: Starting kubelet.service...
Dec 13 13:56:29.451981 systemd[1]: Reloading.
Dec 13 13:56:29.507320 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T13:56:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]"
Dec 13 13:56:29.507347 /usr/lib/systemd/system-generators/torcx-generator[1407]: time="2024-12-13T13:56:29Z" level=info msg="torcx already run"
Dec 13 13:56:29.671982 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Dec 13 13:56:29.672001 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Dec 13 13:56:29.687628 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Dec 13 13:56:29.736000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.736000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.736000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.736000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.736000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.736000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.736000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.736000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.736000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.736000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.736000 audit: BPF prog-id=40 op=LOAD
Dec 13 13:56:29.736000 audit: BPF prog-id=38 op=UNLOAD
Dec 13 13:56:29.737000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit: BPF prog-id=41 op=LOAD
Dec 13 13:56:29.738000 audit: BPF prog-id=35 op=UNLOAD
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit: BPF prog-id=42 op=LOAD
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.738000 audit: BPF prog-id=43 op=LOAD
Dec 13 13:56:29.738000 audit: BPF prog-id=36 op=UNLOAD
Dec 13 13:56:29.738000 audit: BPF prog-id=37 op=UNLOAD
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit: BPF prog-id=44 op=LOAD
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit: BPF prog-id=45 op=LOAD
Dec 13 13:56:29.739000 audit: BPF prog-id=24 op=UNLOAD
Dec 13 13:56:29.739000 audit: BPF prog-id=25 op=UNLOAD
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.739000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.740000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.740000 audit: BPF prog-id=46 op=LOAD
Dec 13 13:56:29.740000 audit: BPF prog-id=33 op=UNLOAD
Dec 13 13:56:29.740000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.740000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.740000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.740000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.740000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.740000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.740000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.740000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.740000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.740000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.740000 audit: BPF prog-id=47 op=LOAD
Dec 13 13:56:29.740000 audit: BPF prog-id=26 op=UNLOAD
Dec 13 13:56:29.741000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.741000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.741000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.741000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.741000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.741000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.741000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.741000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.741000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.741000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.741000 audit: BPF prog-id=48 op=LOAD
Dec 13 13:56:29.741000 audit: BPF prog-id=34 op=UNLOAD
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit: BPF prog-id=49 op=LOAD
Dec 13 13:56:29.742000 audit: BPF prog-id=27 op=UNLOAD
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit: BPF prog-id=50 op=LOAD
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.742000 audit: BPF prog-id=51 op=LOAD
Dec 13 13:56:29.742000 audit: BPF prog-id=28 op=UNLOAD
Dec 13 13:56:29.742000 audit: BPF prog-id=29 op=UNLOAD
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit: BPF prog-id=52 op=LOAD
Dec 13 13:56:29.743000 audit: BPF prog-id=30 op=UNLOAD
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit: BPF prog-id=53 op=LOAD
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:29.743000 audit: BPF prog-id=54 op=LOAD
Dec 13 13:56:29.743000 audit: BPF prog-id=31 op=UNLOAD
Dec 13 13:56:29.743000 audit: BPF prog-id=32 op=UNLOAD
Dec 13 13:56:29.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:29.760710 systemd[1]: Started kubelet.service.
Dec 13 13:56:29.762532 systemd[1]: Stopping kubelet.service...
Dec 13 13:56:29.762877 systemd[1]: kubelet.service: Deactivated successfully.
Dec 13 13:56:29.763061 systemd[1]: Stopped kubelet.service.
Dec 13 13:56:29.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:29.764502 systemd[1]: Starting kubelet.service...
Dec 13 13:56:29.845580 systemd[1]: Started kubelet.service.
Dec 13 13:56:29.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:29.884016 kubelet[1452]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Dec 13 13:56:29.884016 kubelet[1452]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI.
Dec 13 13:56:29.884016 kubelet[1452]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Dec 13 13:56:29.885793 kubelet[1452]: I1213 13:56:29.885734    1452 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Dec 13 13:56:30.555610 kubelet[1452]: I1213 13:56:30.555577    1452 server.go:484] "Kubelet version" kubeletVersion="v1.30.1"
Dec 13 13:56:30.555741 kubelet[1452]: I1213 13:56:30.555731    1452 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Dec 13 13:56:30.555979 kubelet[1452]: I1213 13:56:30.555963    1452 server.go:927] "Client rotation is on, will bootstrap in background"
Dec 13 13:56:30.591202 kubelet[1452]: I1213 13:56:30.591157    1452 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Dec 13 13:56:30.600416 kubelet[1452]: I1213 13:56:30.600393    1452 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Dec 13 13:56:30.600768 kubelet[1452]: I1213 13:56:30.600748    1452 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Dec 13 13:56:30.600932 kubelet[1452]: I1213 13:56:30.600770    1452 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.0.0.19","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null}
Dec 13 13:56:30.601024 kubelet[1452]: I1213 13:56:30.600995    1452 topology_manager.go:138] "Creating topology manager with none policy"
Dec 13 13:56:30.601024 kubelet[1452]: I1213 13:56:30.601004    1452 container_manager_linux.go:301] "Creating device plugin manager"
Dec 13 13:56:30.601276 kubelet[1452]: I1213 13:56:30.601262    1452 state_mem.go:36] "Initialized new in-memory state store"
Dec 13 13:56:30.603967 kubelet[1452]: I1213 13:56:30.603942    1452 kubelet.go:400] "Attempting to sync node with API server"
Dec 13 13:56:30.604004 kubelet[1452]: I1213 13:56:30.603971    1452 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests"
Dec 13 13:56:30.604097 kubelet[1452]: I1213 13:56:30.604081    1452 kubelet.go:312] "Adding apiserver pod source"
Dec 13 13:56:30.604210 kubelet[1452]: I1213 13:56:30.604195    1452 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Dec 13 13:56:30.604466 kubelet[1452]: E1213 13:56:30.604387    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:30.604466 kubelet[1452]: E1213 13:56:30.604427    1452 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:30.605351 kubelet[1452]: I1213 13:56:30.605330    1452 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Dec 13 13:56:30.605685 kubelet[1452]: I1213 13:56:30.605658    1452 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode"
Dec 13 13:56:30.605770 kubelet[1452]: W1213 13:56:30.605758    1452 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.
Dec 13 13:56:30.606550 kubelet[1452]: I1213 13:56:30.606530    1452 server.go:1264] "Started kubelet"
Dec 13 13:56:30.607150 kubelet[1452]: I1213 13:56:30.607112    1452 server.go:163] "Starting to listen" address="0.0.0.0" port=10250
Dec 13 13:56:30.607230 kubelet[1452]: I1213 13:56:30.607177    1452 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10
Dec 13 13:56:30.607507 kubelet[1452]: I1213 13:56:30.607488    1452 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock"
Dec 13 13:56:30.607000 audit[1452]: AVC avc:  denied  { mac_admin } for  pid=1452 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:30.607000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Dec 13 13:56:30.607000 audit[1452]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008fb110 a1=4000a18c48 a2=40008fb0e0 a3=25 items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:30.607000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Dec 13 13:56:30.607000 audit[1452]: AVC avc:  denied  { mac_admin } for  pid=1452 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:30.607000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Dec 13 13:56:30.607000 audit[1452]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008f4e20 a1=4000a18c60 a2=40008fb1a0 a3=25 items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:30.607000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Dec 13 13:56:30.607943 kubelet[1452]: I1213 13:56:30.607691    1452 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Dec 13 13:56:30.607943 kubelet[1452]: I1213 13:56:30.607726    1452 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Dec 13 13:56:30.607943 kubelet[1452]: I1213 13:56:30.607779    1452 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Dec 13 13:56:30.609371 kubelet[1452]: I1213 13:56:30.609354    1452 server.go:455] "Adding debug handlers to kubelet server"
Dec 13 13:56:30.611035 kubelet[1452]: E1213 13:56:30.610996    1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found"
Dec 13 13:56:30.611354 kubelet[1452]: I1213 13:56:30.611333    1452 volume_manager.go:291] "Starting Kubelet Volume Manager"
Dec 13 13:56:30.611700 kubelet[1452]: I1213 13:56:30.611673    1452 desired_state_of_world_populator.go:149] "Desired state populator starts to run"
Dec 13 13:56:30.613931 kubelet[1452]: I1213 13:56:30.613909    1452 factory.go:221] Registration of the systemd container factory successfully
Dec 13 13:56:30.614168 kubelet[1452]: I1213 13:56:30.614141    1452 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory
Dec 13 13:56:30.614768 kubelet[1452]: E1213 13:56:30.614730    1452 controller.go:145] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.0.0.19\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms"
Dec 13 13:56:30.615041 kubelet[1452]: W1213 13:56:30.615002    1452 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Dec 13 13:56:30.615041 kubelet[1452]: E1213 13:56:30.615038    1452 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Dec 13 13:56:30.617069 kubelet[1452]: I1213 13:56:30.617046    1452 reconciler.go:26] "Reconciler: start to sync state"
Dec 13 13:56:30.617409 kubelet[1452]: E1213 13:56:30.617377    1452 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Dec 13 13:56:30.618937 kubelet[1452]: I1213 13:56:30.618766    1452 factory.go:221] Registration of the containerd container factory successfully
Dec 13 13:56:30.623821 kubelet[1452]: W1213 13:56:30.623774    1452 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Dec 13 13:56:30.623821 kubelet[1452]: E1213 13:56:30.623818    1452 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Dec 13 13:56:30.623908 kubelet[1452]: W1213 13:56:30.623846    1452 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: nodes "10.0.0.19" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Dec 13 13:56:30.623908 kubelet[1452]: E1213 13:56:30.623856    1452 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.0.0.19" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Dec 13 13:56:30.631263 kubelet[1452]: E1213 13:56:30.631012    1452 event.go:359] "Server rejected event (will not retry!)" err="events is forbidden: User \"system:anonymous\" cannot create resource \"events\" in API group \"\" in the namespace \"default\"" event="&Event{ObjectMeta:{10.0.0.19.1810c11de0bf8ddd  default    0 0001-01-01 00:00:00 +0000 UTC <nil> <nil> map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:10.0.0.19,UID:10.0.0.19,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:10.0.0.19,},FirstTimestamp:2024-12-13 13:56:30.606503389 +0000 UTC m=+0.757889635,LastTimestamp:2024-12-13 13:56:30.606503389 +0000 UTC m=+0.757889635,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:10.0.0.19,}"
Dec 13 13:56:30.631964 kubelet[1452]: I1213 13:56:30.631943    1452 cpu_manager.go:214] "Starting CPU manager" policy="none"
Dec 13 13:56:30.631964 kubelet[1452]: I1213 13:56:30.631959    1452 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Dec 13 13:56:30.632048 kubelet[1452]: I1213 13:56:30.631977    1452 state_mem.go:36] "Initialized new in-memory state store"
Dec 13 13:56:30.698211 kubelet[1452]: I1213 13:56:30.698180    1452 policy_none.go:49] "None policy: Start"
Dec 13 13:56:30.699319 kubelet[1452]: I1213 13:56:30.699303    1452 memory_manager.go:170] "Starting memorymanager" policy="None"
Dec 13 13:56:30.699383 kubelet[1452]: I1213 13:56:30.699331    1452 state_mem.go:35] "Initializing new in-memory state store"
Dec 13 13:56:30.705484 systemd[1]: Created slice kubepods.slice.
Dec 13 13:56:30.707000 audit[1467]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:30.707000 audit[1467]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe7811c30 a2=0 a3=1 items=0 ppid=1452 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:30.707000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Dec 13 13:56:30.708000 audit[1470]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:30.708000 audit[1470]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffc43536c0 a2=0 a3=1 items=0 ppid=1452 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:30.708000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Dec 13 13:56:30.710343 systemd[1]: Created slice kubepods-besteffort.slice.
Dec 13 13:56:30.713712 kubelet[1452]: I1213 13:56:30.713674    1452 kubelet_node_status.go:73] "Attempting to register node" node="10.0.0.19"
Dec 13 13:56:30.717065 kubelet[1452]: I1213 13:56:30.717029    1452 kubelet_node_status.go:76] "Successfully registered node" node="10.0.0.19"
Dec 13 13:56:30.723548 systemd[1]: Created slice kubepods-burstable.slice.
Dec 13 13:56:30.724747 kubelet[1452]: I1213 13:56:30.724724    1452 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Dec 13 13:56:30.723000 audit[1452]: AVC avc:  denied  { mac_admin } for  pid=1452 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:30.723000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Dec 13 13:56:30.723000 audit[1452]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d2edb0 a1=4000b7d6f8 a2=4000d2ed80 a3=25 items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:30.723000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Dec 13 13:56:30.725011 kubelet[1452]: I1213 13:56:30.724783    1452 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Dec 13 13:56:30.725011 kubelet[1452]: I1213 13:56:30.724894    1452 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s"
Dec 13 13:56:30.725011 kubelet[1452]: I1213 13:56:30.725002    1452 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Dec 13 13:56:30.726484 kubelet[1452]: E1213 13:56:30.726452    1452 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.0.0.19\" not found"
Dec 13 13:56:30.726663 kubelet[1452]: E1213 13:56:30.726632    1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found"
Dec 13 13:56:30.713000 audit[1472]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:30.713000 audit[1472]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff676ff80 a2=0 a3=1 items=0 ppid=1452 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:30.713000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Dec 13 13:56:30.734000 audit[1478]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:30.734000 audit[1478]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffcbb35350 a2=0 a3=1 items=0 ppid=1452 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:30.734000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Dec 13 13:56:30.768000 audit[1483]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:30.768000 audit[1483]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff784aa30 a2=0 a3=1 items=0 ppid=1452 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:30.768000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38
Dec 13 13:56:30.769047 kubelet[1452]: I1213 13:56:30.769008    1452 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4"
Dec 13 13:56:30.769000 audit[1485]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:30.769000 audit[1485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd17b72b0 a2=0 a3=1 items=0 ppid=1452 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:30.769000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Dec 13 13:56:30.769000 audit[1484]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:30.769000 audit[1484]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffce2a0990 a2=0 a3=1 items=0 ppid=1452 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:30.769000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Dec 13 13:56:30.770277 kubelet[1452]: I1213 13:56:30.770252    1452 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6"
Dec 13 13:56:30.770363 kubelet[1452]: I1213 13:56:30.770349    1452 status_manager.go:217] "Starting to sync pod status with apiserver"
Dec 13 13:56:30.770392 kubelet[1452]: I1213 13:56:30.770373    1452 kubelet.go:2337] "Starting kubelet main sync loop"
Dec 13 13:56:30.770430 kubelet[1452]: E1213 13:56:30.770418    1452 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful"
Dec 13 13:56:30.771000 audit[1486]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:30.771000 audit[1487]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:30.771000 audit[1487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc05486c0 a2=0 a3=1 items=0 ppid=1452 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:30.771000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Dec 13 13:56:30.771000 audit[1486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffec8ccf80 a2=0 a3=1 items=0 ppid=1452 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:30.771000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Dec 13 13:56:30.772000 audit[1488]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:30.772000 audit[1488]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe4bd9240 a2=0 a3=1 items=0 ppid=1452 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:30.772000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Dec 13 13:56:30.772000 audit[1489]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:30.772000 audit[1489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc7be98e0 a2=0 a3=1 items=0 ppid=1452 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:30.772000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Dec 13 13:56:30.773000 audit[1490]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:30.773000 audit[1490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc3539e50 a2=0 a3=1 items=0 ppid=1452 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:30.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Dec 13 13:56:30.827614 kubelet[1452]: E1213 13:56:30.827517    1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found"
Dec 13 13:56:30.866041 sudo[1341]: pam_unix(sudo:session): session closed for user root
Dec 13 13:56:30.865000 audit[1341]: USER_END pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:30.865000 audit[1341]: CRED_DISP pid=1341 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:30.867410 sshd[1337]: pam_unix(sshd:session): session closed for user core
Dec 13 13:56:30.867000 audit[1337]: USER_END pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 13:56:30.868000 audit[1337]: CRED_DISP pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success'
Dec 13 13:56:30.869693 systemd[1]: sshd@6-10.0.0.19:22-10.0.0.1:56808.service: Deactivated successfully.
Dec 13 13:56:30.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.19:22-10.0.0.1:56808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Dec 13 13:56:30.870380 systemd[1]: session-7.scope: Deactivated successfully.
Dec 13 13:56:30.870887 systemd-logind[1194]: Session 7 logged out. Waiting for processes to exit.
Dec 13 13:56:30.871546 systemd-logind[1194]: Removed session 7.
Dec 13 13:56:30.928289 kubelet[1452]: E1213 13:56:30.928211    1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found"
Dec 13 13:56:31.028691 kubelet[1452]: E1213 13:56:31.028666    1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found"
Dec 13 13:56:31.129354 kubelet[1452]: E1213 13:56:31.129258    1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found"
Dec 13 13:56:31.229703 kubelet[1452]: E1213 13:56:31.229677    1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found"
Dec 13 13:56:31.330174 kubelet[1452]: E1213 13:56:31.330151    1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found"
Dec 13 13:56:31.430843 kubelet[1452]: E1213 13:56:31.430759    1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found"
Dec 13 13:56:31.531279 kubelet[1452]: E1213 13:56:31.531244    1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found"
Dec 13 13:56:31.558410 kubelet[1452]: I1213 13:56:31.558390    1452 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials"
Dec 13 13:56:31.558920 kubelet[1452]: W1213 13:56:31.558889    1452 reflector.go:470] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received
Dec 13 13:56:31.604698 kubelet[1452]: E1213 13:56:31.604655    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:31.631661 kubelet[1452]: E1213 13:56:31.631626    1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found"
Dec 13 13:56:31.732393 kubelet[1452]: E1213 13:56:31.732284    1452 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"10.0.0.19\" not found"
Dec 13 13:56:31.833718 kubelet[1452]: I1213 13:56:31.833691    1452 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24"
Dec 13 13:56:31.834260 env[1206]: time="2024-12-13T13:56:31.834182971Z" level=info msg="No cni config template is specified, wait for other system components to drop the config."
Dec 13 13:56:31.834755 kubelet[1452]: I1213 13:56:31.834735    1452 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24"
Dec 13 13:56:32.605295 kubelet[1452]: E1213 13:56:32.605225    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:32.605295 kubelet[1452]: I1213 13:56:32.605244    1452 apiserver.go:52] "Watching apiserver"
Dec 13 13:56:32.609719 kubelet[1452]: I1213 13:56:32.609678    1452 topology_manager.go:215] "Topology Admit Handler" podUID="7f517b72-957a-469d-bb88-9394e18cc20a" podNamespace="calico-system" podName="calico-node-wqwlk"
Dec 13 13:56:32.609939 kubelet[1452]: I1213 13:56:32.609920    1452 topology_manager.go:215] "Topology Admit Handler" podUID="8da14905-625a-4f83-a34c-8ea13d6ed11a" podNamespace="calico-system" podName="csi-node-driver-6tkwm"
Dec 13 13:56:32.610124 kubelet[1452]: I1213 13:56:32.610106    1452 topology_manager.go:215] "Topology Admit Handler" podUID="f7de8412-fa03-4dfe-8082-45475c0d1113" podNamespace="kube-system" podName="kube-proxy-7jw9p"
Dec 13 13:56:32.610430 kubelet[1452]: E1213 13:56:32.610271    1452 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6tkwm" podUID="8da14905-625a-4f83-a34c-8ea13d6ed11a"
Dec 13 13:56:32.614858 systemd[1]: Created slice kubepods-besteffort-pod7f517b72_957a_469d_bb88_9394e18cc20a.slice.
Dec 13 13:56:32.615418 kubelet[1452]: I1213 13:56:32.615211    1452 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world"
Dec 13 13:56:32.625399 systemd[1]: Created slice kubepods-besteffort-podf7de8412_fa03_4dfe_8082_45475c0d1113.slice.
Dec 13 13:56:32.627058 kubelet[1452]: I1213 13:56:32.627019    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6tkxr\" (UniqueName: \"kubernetes.io/projected/f7de8412-fa03-4dfe-8082-45475c0d1113-kube-api-access-6tkxr\") pod \"kube-proxy-7jw9p\" (UID: \"f7de8412-fa03-4dfe-8082-45475c0d1113\") " pod="kube-system/kube-proxy-7jw9p"
Dec 13 13:56:32.627125 kubelet[1452]: I1213 13:56:32.627059    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7f517b72-957a-469d-bb88-9394e18cc20a-lib-modules\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk"
Dec 13 13:56:32.627125 kubelet[1452]: I1213 13:56:32.627079    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7f517b72-957a-469d-bb88-9394e18cc20a-xtables-lock\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk"
Dec 13 13:56:32.627125 kubelet[1452]: I1213 13:56:32.627094    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/7f517b72-957a-469d-bb88-9394e18cc20a-node-certs\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk"
Dec 13 13:56:32.627125 kubelet[1452]: I1213 13:56:32.627115    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7f517b72-957a-469d-bb88-9394e18cc20a-var-lib-calico\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk"
Dec 13 13:56:32.627224 kubelet[1452]: I1213 13:56:32.627131    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/7f517b72-957a-469d-bb88-9394e18cc20a-cni-log-dir\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk"
Dec 13 13:56:32.627224 kubelet[1452]: I1213 13:56:32.627169    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jvmgc\" (UniqueName: \"kubernetes.io/projected/7f517b72-957a-469d-bb88-9394e18cc20a-kube-api-access-jvmgc\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk"
Dec 13 13:56:32.627224 kubelet[1452]: I1213 13:56:32.627186    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/8da14905-625a-4f83-a34c-8ea13d6ed11a-socket-dir\") pod \"csi-node-driver-6tkwm\" (UID: \"8da14905-625a-4f83-a34c-8ea13d6ed11a\") " pod="calico-system/csi-node-driver-6tkwm"
Dec 13 13:56:32.627224 kubelet[1452]: I1213 13:56:32.627203    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f7de8412-fa03-4dfe-8082-45475c0d1113-lib-modules\") pod \"kube-proxy-7jw9p\" (UID: \"f7de8412-fa03-4dfe-8082-45475c0d1113\") " pod="kube-system/kube-proxy-7jw9p"
Dec 13 13:56:32.627224 kubelet[1452]: I1213 13:56:32.627218    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/7f517b72-957a-469d-bb88-9394e18cc20a-var-run-calico\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk"
Dec 13 13:56:32.627360 kubelet[1452]: I1213 13:56:32.627260    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/7f517b72-957a-469d-bb88-9394e18cc20a-cni-bin-dir\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk"
Dec 13 13:56:32.627360 kubelet[1452]: I1213 13:56:32.627277    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/7f517b72-957a-469d-bb88-9394e18cc20a-flexvol-driver-host\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk"
Dec 13 13:56:32.627360 kubelet[1452]: I1213 13:56:32.627294    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/8da14905-625a-4f83-a34c-8ea13d6ed11a-registration-dir\") pod \"csi-node-driver-6tkwm\" (UID: \"8da14905-625a-4f83-a34c-8ea13d6ed11a\") " pod="calico-system/csi-node-driver-6tkwm"
Dec 13 13:56:32.627360 kubelet[1452]: I1213 13:56:32.627310    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7f517b72-957a-469d-bb88-9394e18cc20a-tigera-ca-bundle\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk"
Dec 13 13:56:32.627360 kubelet[1452]: I1213 13:56:32.627324    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f7de8412-fa03-4dfe-8082-45475c0d1113-xtables-lock\") pod \"kube-proxy-7jw9p\" (UID: \"f7de8412-fa03-4dfe-8082-45475c0d1113\") " pod="kube-system/kube-proxy-7jw9p"
Dec 13 13:56:32.627469 kubelet[1452]: I1213 13:56:32.627340    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/8da14905-625a-4f83-a34c-8ea13d6ed11a-kubelet-dir\") pod \"csi-node-driver-6tkwm\" (UID: \"8da14905-625a-4f83-a34c-8ea13d6ed11a\") " pod="calico-system/csi-node-driver-6tkwm"
Dec 13 13:56:32.627469 kubelet[1452]: I1213 13:56:32.627403    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ttwdj\" (UniqueName: \"kubernetes.io/projected/8da14905-625a-4f83-a34c-8ea13d6ed11a-kube-api-access-ttwdj\") pod \"csi-node-driver-6tkwm\" (UID: \"8da14905-625a-4f83-a34c-8ea13d6ed11a\") " pod="calico-system/csi-node-driver-6tkwm"
Dec 13 13:56:32.627469 kubelet[1452]: I1213 13:56:32.627421    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/f7de8412-fa03-4dfe-8082-45475c0d1113-kube-proxy\") pod \"kube-proxy-7jw9p\" (UID: \"f7de8412-fa03-4dfe-8082-45475c0d1113\") " pod="kube-system/kube-proxy-7jw9p"
Dec 13 13:56:32.627540 kubelet[1452]: I1213 13:56:32.627457    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/7f517b72-957a-469d-bb88-9394e18cc20a-policysync\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk"
Dec 13 13:56:32.627540 kubelet[1452]: I1213 13:56:32.627495    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/7f517b72-957a-469d-bb88-9394e18cc20a-cni-net-dir\") pod \"calico-node-wqwlk\" (UID: \"7f517b72-957a-469d-bb88-9394e18cc20a\") " pod="calico-system/calico-node-wqwlk"
Dec 13 13:56:32.627540 kubelet[1452]: I1213 13:56:32.627511    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/8da14905-625a-4f83-a34c-8ea13d6ed11a-varrun\") pod \"csi-node-driver-6tkwm\" (UID: \"8da14905-625a-4f83-a34c-8ea13d6ed11a\") " pod="calico-system/csi-node-driver-6tkwm"
Dec 13 13:56:32.730048 kubelet[1452]: E1213 13:56:32.730020    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:32.730178 kubelet[1452]: W1213 13:56:32.730163    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:32.730274 kubelet[1452]: E1213 13:56:32.730259    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:32.733140 kubelet[1452]: E1213 13:56:32.733119    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:32.733283 kubelet[1452]: W1213 13:56:32.733264    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:32.733351 kubelet[1452]: E1213 13:56:32.733339    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:32.742488 kubelet[1452]: E1213 13:56:32.742470    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:32.742594 kubelet[1452]: W1213 13:56:32.742579    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:32.742657 kubelet[1452]: E1213 13:56:32.742646    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:32.745273 kubelet[1452]: E1213 13:56:32.745256    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:32.745379 kubelet[1452]: W1213 13:56:32.745364    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:32.745433 kubelet[1452]: E1213 13:56:32.745424    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:32.747441 kubelet[1452]: E1213 13:56:32.747414    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:32.747441 kubelet[1452]: W1213 13:56:32.747435    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:32.747606 kubelet[1452]: E1213 13:56:32.747448    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:32.924481 kubelet[1452]: E1213 13:56:32.924368    1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 13:56:32.925321 env[1206]: time="2024-12-13T13:56:32.925157997Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wqwlk,Uid:7f517b72-957a-469d-bb88-9394e18cc20a,Namespace:calico-system,Attempt:0,}"
Dec 13 13:56:32.928029 kubelet[1452]: E1213 13:56:32.928004    1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 13:56:32.928615 env[1206]: time="2024-12-13T13:56:32.928578141Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7jw9p,Uid:f7de8412-fa03-4dfe-8082-45475c0d1113,Namespace:kube-system,Attempt:0,}"
Dec 13 13:56:33.483424 env[1206]: time="2024-12-13T13:56:33.483373331Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:33.485327 env[1206]: time="2024-12-13T13:56:33.485290185Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:33.486657 env[1206]: time="2024-12-13T13:56:33.486629010Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:33.488458 env[1206]: time="2024-12-13T13:56:33.488420541Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:33.489708 env[1206]: time="2024-12-13T13:56:33.489676597Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:33.492264 env[1206]: time="2024-12-13T13:56:33.492214513Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:33.494007 env[1206]: time="2024-12-13T13:56:33.493972182Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:33.498481 env[1206]: time="2024-12-13T13:56:33.498422744Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:33.530946 env[1206]: time="2024-12-13T13:56:33.530858619Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 13:56:33.531089 env[1206]: time="2024-12-13T13:56:33.530928128Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 13:56:33.531089 env[1206]: time="2024-12-13T13:56:33.530965563Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 13:56:33.531089 env[1206]: time="2024-12-13T13:56:33.530975725Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 13:56:33.531089 env[1206]: time="2024-12-13T13:56:33.530955321Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 13:56:33.531089 env[1206]: time="2024-12-13T13:56:33.531029515Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 13:56:33.531312 env[1206]: time="2024-12-13T13:56:33.531200173Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f21c58afdc2aa3a6e3d31d55f60385536577a9e5d3f9966538c9edd51cfae2f5 pid=1519 runtime=io.containerd.runc.v2
Dec 13 13:56:33.531393 env[1206]: time="2024-12-13T13:56:33.531342288Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e337b86b33c0483134753996a4427b868006567cde72646b060a78e82664476f pid=1520 runtime=io.containerd.runc.v2
Dec 13 13:56:33.551685 systemd[1]: Started cri-containerd-f21c58afdc2aa3a6e3d31d55f60385536577a9e5d3f9966538c9edd51cfae2f5.scope.
Dec 13 13:56:33.554962 systemd[1]: Started cri-containerd-e337b86b33c0483134753996a4427b868006567cde72646b060a78e82664476f.scope.
Dec 13 13:56:33.579000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.579000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.579000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.579000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.579000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.579000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.579000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.579000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.579000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.579000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.579000 audit: BPF prog-id=55 op=LOAD
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { bpf } for  pid=1537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1519 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:33.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316335386166646332616133613665336433316435356636303338
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { perfmon } for  pid=1537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1519 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:33.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316335386166646332616133613665336433316435356636303338
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { bpf } for  pid=1537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { bpf } for  pid=1537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { bpf } for  pid=1537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { perfmon } for  pid=1537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { perfmon } for  pid=1537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { perfmon } for  pid=1537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { perfmon } for  pid=1537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { perfmon } for  pid=1537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { bpf } for  pid=1537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { bpf } for  pid=1537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit: BPF prog-id=56 op=LOAD
Dec 13 13:56:33.580000 audit[1537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1519 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:33.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316335386166646332616133613665336433316435356636303338
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { bpf } for  pid=1537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { bpf } for  pid=1537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { perfmon } for  pid=1537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { perfmon } for  pid=1537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { perfmon } for  pid=1537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { perfmon } for  pid=1537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { perfmon } for  pid=1537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { bpf } for  pid=1537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { bpf } for  pid=1537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit: BPF prog-id=57 op=LOAD
Dec 13 13:56:33.580000 audit[1537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1519 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:33.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316335386166646332616133613665336433316435356636303338
Dec 13 13:56:33.580000 audit: BPF prog-id=57 op=UNLOAD
Dec 13 13:56:33.580000 audit: BPF prog-id=56 op=UNLOAD
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { bpf } for  pid=1537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { bpf } for  pid=1537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { bpf } for  pid=1537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { perfmon } for  pid=1537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { perfmon } for  pid=1537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { perfmon } for  pid=1537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { perfmon } for  pid=1537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { perfmon } for  pid=1537 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { bpf } for  pid=1537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit[1537]: AVC avc:  denied  { bpf } for  pid=1537 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.580000 audit: BPF prog-id=58 op=LOAD
Dec 13 13:56:33.580000 audit[1537]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1519 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:33.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316335386166646332616133613665336433316435356636303338
Dec 13 13:56:33.581000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.581000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.581000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.581000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.581000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.581000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.581000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.581000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.581000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.581000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.581000 audit: BPF prog-id=59 op=LOAD
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1520 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:33.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533333762383662333363303438333133343735333939366134343237
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1520 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:33.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533333762383662333363303438333133343735333939366134343237
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit: BPF prog-id=60 op=LOAD
Dec 13 13:56:33.582000 audit[1539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1520 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:33.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533333762383662333363303438333133343735333939366134343237
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit: BPF prog-id=61 op=LOAD
Dec 13 13:56:33.582000 audit[1539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1520 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:33.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533333762383662333363303438333133343735333939366134343237
Dec 13 13:56:33.582000 audit: BPF prog-id=61 op=UNLOAD
Dec 13 13:56:33.582000 audit: BPF prog-id=60 op=UNLOAD
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { perfmon } for  pid=1539 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit[1539]: AVC avc:  denied  { bpf } for  pid=1539 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:33.582000 audit: BPF prog-id=62 op=LOAD
Dec 13 13:56:33.582000 audit[1539]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1520 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:33.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533333762383662333363303438333133343735333939366134343237
Dec 13 13:56:33.597797 env[1206]: time="2024-12-13T13:56:33.596746217Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7jw9p,Uid:f7de8412-fa03-4dfe-8082-45475c0d1113,Namespace:kube-system,Attempt:0,} returns sandbox id \"f21c58afdc2aa3a6e3d31d55f60385536577a9e5d3f9966538c9edd51cfae2f5\""
Dec 13 13:56:33.597909 kubelet[1452]: E1213 13:56:33.597673    1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 13:56:33.599088 env[1206]: time="2024-12-13T13:56:33.598867551Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\""
Dec 13 13:56:33.599382 env[1206]: time="2024-12-13T13:56:33.599350387Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wqwlk,Uid:7f517b72-957a-469d-bb88-9394e18cc20a,Namespace:calico-system,Attempt:0,} returns sandbox id \"e337b86b33c0483134753996a4427b868006567cde72646b060a78e82664476f\""
Dec 13 13:56:33.599849 kubelet[1452]: E1213 13:56:33.599828    1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 13:56:33.606060 kubelet[1452]: E1213 13:56:33.606028    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:33.738438 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount612244237.mount: Deactivated successfully.
Dec 13 13:56:33.770929 kubelet[1452]: E1213 13:56:33.770851    1452 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6tkwm" podUID="8da14905-625a-4f83-a34c-8ea13d6ed11a"
Dec 13 13:56:34.606424 kubelet[1452]: E1213 13:56:34.606367    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:34.640205 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2816558228.mount: Deactivated successfully.
Dec 13 13:56:35.060520 env[1206]: time="2024-12-13T13:56:35.060421893Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:35.061895 env[1206]: time="2024-12-13T13:56:35.061866350Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4612aebc0675831aedbbde7cd56b85db91f1fdcf05ef923072961538ec497adb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:35.064643 env[1206]: time="2024-12-13T13:56:35.064606293Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:35.065773 env[1206]: time="2024-12-13T13:56:35.065751575Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:35.066114 env[1206]: time="2024-12-13T13:56:35.066089047Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:4612aebc0675831aedbbde7cd56b85db91f1fdcf05ef923072961538ec497adb\""
Dec 13 13:56:35.067924 env[1206]: time="2024-12-13T13:56:35.067896069Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\""
Dec 13 13:56:35.068970 env[1206]: time="2024-12-13T13:56:35.068937119Z" level=info msg="CreateContainer within sandbox \"f21c58afdc2aa3a6e3d31d55f60385536577a9e5d3f9966538c9edd51cfae2f5\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}"
Dec 13 13:56:35.080431 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount552174314.mount: Deactivated successfully.
Dec 13 13:56:35.083709 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount685565257.mount: Deactivated successfully.
Dec 13 13:56:35.089743 env[1206]: time="2024-12-13T13:56:35.089698692Z" level=info msg="CreateContainer within sandbox \"f21c58afdc2aa3a6e3d31d55f60385536577a9e5d3f9966538c9edd51cfae2f5\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9faa1a65e83c419eb3eb37937e46de92510e066e536b1b0cb35d2acbf9322fed\""
Dec 13 13:56:35.090491 env[1206]: time="2024-12-13T13:56:35.090462041Z" level=info msg="StartContainer for \"9faa1a65e83c419eb3eb37937e46de92510e066e536b1b0cb35d2acbf9322fed\""
Dec 13 13:56:35.108003 systemd[1]: Started cri-containerd-9faa1a65e83c419eb3eb37937e46de92510e066e536b1b0cb35d2acbf9322fed.scope.
Dec 13 13:56:35.129000 audit[1596]: AVC avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.131528 kernel: kauditd_printk_skb: 357 callbacks suppressed
Dec 13 13:56:35.131603 kernel: audit: type=1400 audit(1734098195.129:448): avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.129000 audit[1596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1519 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.136197 kernel: audit: type=1300 audit(1734098195.129:448): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1519 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.136272 kernel: audit: type=1327 audit(1734098195.129:448): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966616131613635653833633431396562336562333739333765343664
Dec 13 13:56:35.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966616131613635653833633431396562336562333739333765343664
Dec 13 13:56:35.129000 audit[1596]: AVC avc:  denied  { bpf } for  pid=1596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.140485 kernel: audit: type=1400 audit(1734098195.129:449): avc:  denied  { bpf } for  pid=1596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.140542 kernel: audit: type=1400 audit(1734098195.129:449): avc:  denied  { bpf } for  pid=1596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.129000 audit[1596]: AVC avc:  denied  { bpf } for  pid=1596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.142224 kernel: audit: type=1400 audit(1734098195.129:449): avc:  denied  { bpf } for  pid=1596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.129000 audit[1596]: AVC avc:  denied  { bpf } for  pid=1596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.129000 audit[1596]: AVC avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.145781 kernel: audit: type=1400 audit(1734098195.129:449): avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.129000 audit[1596]: AVC avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.148020 kernel: audit: type=1400 audit(1734098195.129:449): avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.148079 kernel: audit: type=1400 audit(1734098195.129:449): avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.129000 audit[1596]: AVC avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.149622 kernel: audit: type=1400 audit(1734098195.129:449): avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.129000 audit[1596]: AVC avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.129000 audit[1596]: AVC avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.129000 audit[1596]: AVC avc:  denied  { bpf } for  pid=1596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.129000 audit[1596]: AVC avc:  denied  { bpf } for  pid=1596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.129000 audit: BPF prog-id=63 op=LOAD
Dec 13 13:56:35.129000 audit[1596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1519 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966616131613635653833633431396562336562333739333765343664
Dec 13 13:56:35.130000 audit[1596]: AVC avc:  denied  { bpf } for  pid=1596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.130000 audit[1596]: AVC avc:  denied  { bpf } for  pid=1596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.130000 audit[1596]: AVC avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.130000 audit[1596]: AVC avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.130000 audit[1596]: AVC avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.130000 audit[1596]: AVC avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.130000 audit[1596]: AVC avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.130000 audit[1596]: AVC avc:  denied  { bpf } for  pid=1596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.130000 audit[1596]: AVC avc:  denied  { bpf } for  pid=1596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.130000 audit: BPF prog-id=64 op=LOAD
Dec 13 13:56:35.130000 audit[1596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1519 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966616131613635653833633431396562336562333739333765343664
Dec 13 13:56:35.132000 audit: BPF prog-id=64 op=UNLOAD
Dec 13 13:56:35.132000 audit: BPF prog-id=63 op=UNLOAD
Dec 13 13:56:35.132000 audit[1596]: AVC avc:  denied  { bpf } for  pid=1596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.132000 audit[1596]: AVC avc:  denied  { bpf } for  pid=1596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.132000 audit[1596]: AVC avc:  denied  { bpf } for  pid=1596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.132000 audit[1596]: AVC avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.132000 audit[1596]: AVC avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.132000 audit[1596]: AVC avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.132000 audit[1596]: AVC avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.132000 audit[1596]: AVC avc:  denied  { perfmon } for  pid=1596 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.132000 audit[1596]: AVC avc:  denied  { bpf } for  pid=1596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.132000 audit[1596]: AVC avc:  denied  { bpf } for  pid=1596 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:35.132000 audit: BPF prog-id=65 op=LOAD
Dec 13 13:56:35.132000 audit[1596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1519 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966616131613635653833633431396562336562333739333765343664
Dec 13 13:56:35.158541 env[1206]: time="2024-12-13T13:56:35.158497070Z" level=info msg="StartContainer for \"9faa1a65e83c419eb3eb37937e46de92510e066e536b1b0cb35d2acbf9322fed\" returns successfully"
Dec 13 13:56:35.272000 audit[1648]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.272000 audit[1648]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcbb9d9b0 a2=0 a3=1 items=0 ppid=1607 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.272000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Dec 13 13:56:35.272000 audit[1649]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1649 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.272000 audit[1649]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcb41bf90 a2=0 a3=1 items=0 ppid=1607 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.272000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Dec 13 13:56:35.273000 audit[1650]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1650 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.273000 audit[1650]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdfa601a0 a2=0 a3=1 items=0 ppid=1607 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Dec 13 13:56:35.274000 audit[1651]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_chain pid=1651 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.274000 audit[1651]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff60edc0 a2=0 a3=1 items=0 ppid=1607 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.274000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Dec 13 13:56:35.275000 audit[1653]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1653 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.275000 audit[1653]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc2d59a80 a2=0 a3=1 items=0 ppid=1607 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.275000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Dec 13 13:56:35.276000 audit[1652]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1652 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.276000 audit[1652]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffecbd3560 a2=0 a3=1 items=0 ppid=1607 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.276000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Dec 13 13:56:35.374000 audit[1654]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1654 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.374000 audit[1654]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff0c16600 a2=0 a3=1 items=0 ppid=1607 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.374000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Dec 13 13:56:35.381000 audit[1656]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1656 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.381000 audit[1656]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff4df20b0 a2=0 a3=1 items=0 ppid=1607 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.381000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365
Dec 13 13:56:35.384000 audit[1659]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1659 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.384000 audit[1659]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff6073b00 a2=0 a3=1 items=0 ppid=1607 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.384000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669
Dec 13 13:56:35.385000 audit[1660]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1660 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.385000 audit[1660]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4fa1440 a2=0 a3=1 items=0 ppid=1607 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Dec 13 13:56:35.387000 audit[1662]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1662 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.387000 audit[1662]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe7102930 a2=0 a3=1 items=0 ppid=1607 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.387000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Dec 13 13:56:35.388000 audit[1663]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1663 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.388000 audit[1663]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc01ba9c0 a2=0 a3=1 items=0 ppid=1607 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.388000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Dec 13 13:56:35.391000 audit[1665]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1665 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.391000 audit[1665]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffda2e5370 a2=0 a3=1 items=0 ppid=1607 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.391000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Dec 13 13:56:35.395000 audit[1668]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1668 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.395000 audit[1668]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffda56f280 a2=0 a3=1 items=0 ppid=1607 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.395000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53
Dec 13 13:56:35.402000 audit[1669]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1669 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.402000 audit[1669]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc8b4f530 a2=0 a3=1 items=0 ppid=1607 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.402000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Dec 13 13:56:35.404000 audit[1671]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1671 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.404000 audit[1671]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc19d1b90 a2=0 a3=1 items=0 ppid=1607 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.404000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Dec 13 13:56:35.406000 audit[1672]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1672 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.406000 audit[1672]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc13a1330 a2=0 a3=1 items=0 ppid=1607 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.406000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Dec 13 13:56:35.408000 audit[1674]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1674 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.408000 audit[1674]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc36101e0 a2=0 a3=1 items=0 ppid=1607 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.408000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Dec 13 13:56:35.411000 audit[1677]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1677 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.411000 audit[1677]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff0b63cc0 a2=0 a3=1 items=0 ppid=1607 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Dec 13 13:56:35.414000 audit[1680]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.414000 audit[1680]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc05c22f0 a2=0 a3=1 items=0 ppid=1607 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.414000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Dec 13 13:56:35.416000 audit[1681]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.416000 audit[1681]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd9348400 a2=0 a3=1 items=0 ppid=1607 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.416000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Dec 13 13:56:35.418000 audit[1683]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.418000 audit[1683]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffe413c50 a2=0 a3=1 items=0 ppid=1607 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Dec 13 13:56:35.458000 audit[1688]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.458000 audit[1688]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc2e3e740 a2=0 a3=1 items=0 ppid=1607 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.458000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Dec 13 13:56:35.459000 audit[1689]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.459000 audit[1689]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc6313290 a2=0 a3=1 items=0 ppid=1607 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Dec 13 13:56:35.462000 audit[1691]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Dec 13 13:56:35.462000 audit[1691]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd48fa070 a2=0 a3=1 items=0 ppid=1607 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.462000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Dec 13 13:56:35.486000 audit[1697]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:56:35.486000 audit[1697]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd99093b0 a2=0 a3=1 items=0 ppid=1607 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.486000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:56:35.517000 audit[1697]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:56:35.517000 audit[1697]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9084 a0=3 a1=ffffd99093b0 a2=0 a3=1 items=0 ppid=1607 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.517000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:56:35.518000 audit[1703]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.518000 audit[1703]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd8cb1bc0 a2=0 a3=1 items=0 ppid=1607 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.518000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Dec 13 13:56:35.521000 audit[1705]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.521000 audit[1705]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdec54870 a2=0 a3=1 items=0 ppid=1607 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963
Dec 13 13:56:35.524000 audit[1708]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.524000 audit[1708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd9c1f7f0 a2=0 a3=1 items=0 ppid=1607 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276
Dec 13 13:56:35.525000 audit[1709]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.525000 audit[1709]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc8075be0 a2=0 a3=1 items=0 ppid=1607 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Dec 13 13:56:35.527000 audit[1711]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1711 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.527000 audit[1711]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe54fd680 a2=0 a3=1 items=0 ppid=1607 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Dec 13 13:56:35.528000 audit[1712]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.528000 audit[1712]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffa844290 a2=0 a3=1 items=0 ppid=1607 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.528000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Dec 13 13:56:35.530000 audit[1714]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1714 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.530000 audit[1714]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffdb3d820 a2=0 a3=1 items=0 ppid=1607 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.530000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245
Dec 13 13:56:35.533000 audit[1717]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.533000 audit[1717]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc8fb9880 a2=0 a3=1 items=0 ppid=1607 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Dec 13 13:56:35.534000 audit[1718]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.534000 audit[1718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe2447070 a2=0 a3=1 items=0 ppid=1607 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.534000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Dec 13 13:56:35.537000 audit[1720]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.537000 audit[1720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe818ea60 a2=0 a3=1 items=0 ppid=1607 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.537000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Dec 13 13:56:35.538000 audit[1721]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.538000 audit[1721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffccb04f40 a2=0 a3=1 items=0 ppid=1607 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.538000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Dec 13 13:56:35.540000 audit[1723]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1723 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.540000 audit[1723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd898d180 a2=0 a3=1 items=0 ppid=1607 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.540000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Dec 13 13:56:35.543000 audit[1726]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1726 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.543000 audit[1726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc757a5f0 a2=0 a3=1 items=0 ppid=1607 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Dec 13 13:56:35.546000 audit[1729]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1729 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.546000 audit[1729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcb47fa60 a2=0 a3=1 items=0 ppid=1607 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C
Dec 13 13:56:35.547000 audit[1730]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.547000 audit[1730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd798cd90 a2=0 a3=1 items=0 ppid=1607 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.547000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Dec 13 13:56:35.553000 audit[1732]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.553000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc70bee30 a2=0 a3=1 items=0 ppid=1607 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.553000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Dec 13 13:56:35.558000 audit[1735]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.558000 audit[1735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffee5b6e50 a2=0 a3=1 items=0 ppid=1607 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.558000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Dec 13 13:56:35.559000 audit[1736]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.559000 audit[1736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd4821b50 a2=0 a3=1 items=0 ppid=1607 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Dec 13 13:56:35.562000 audit[1738]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.562000 audit[1738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffeaa82eb0 a2=0 a3=1 items=0 ppid=1607 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.562000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Dec 13 13:56:35.564000 audit[1739]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.564000 audit[1739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9a57c10 a2=0 a3=1 items=0 ppid=1607 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Dec 13 13:56:35.568000 audit[1741]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.568000 audit[1741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff6582a90 a2=0 a3=1 items=0 ppid=1607 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.568000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Dec 13 13:56:35.574000 audit[1744]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Dec 13 13:56:35.574000 audit[1744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc79a3e10 a2=0 a3=1 items=0 ppid=1607 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Dec 13 13:56:35.580000 audit[1746]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Dec 13 13:56:35.580000 audit[1746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffc761f940 a2=0 a3=1 items=0 ppid=1607 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.580000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:56:35.580000 audit[1746]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Dec 13 13:56:35.580000 audit[1746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffc761f940 a2=0 a3=1 items=0 ppid=1607 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:35.580000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:56:35.607377 kubelet[1452]: E1213 13:56:35.607331    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:35.771948 kubelet[1452]: E1213 13:56:35.771561    1452 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6tkwm" podUID="8da14905-625a-4f83-a34c-8ea13d6ed11a"
Dec 13 13:56:35.781942 kubelet[1452]: E1213 13:56:35.781908    1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 13:56:35.793197 kubelet[1452]: I1213 13:56:35.792863    1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-7jw9p" podStartSLOduration=4.323915264 podStartE2EDuration="5.792844133s" podCreationTimestamp="2024-12-13 13:56:30 +0000 UTC" firstStartedPulling="2024-12-13 13:56:33.59840639 +0000 UTC m=+3.749792636" lastFinishedPulling="2024-12-13 13:56:35.06733526 +0000 UTC m=+5.218721505" observedRunningTime="2024-12-13 13:56:35.79265265 +0000 UTC m=+5.944038856" watchObservedRunningTime="2024-12-13 13:56:35.792844133 +0000 UTC m=+5.944230379"
Dec 13 13:56:35.837260 kubelet[1452]: E1213 13:56:35.837200    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.837260 kubelet[1452]: W1213 13:56:35.837246    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.837260 kubelet[1452]: E1213 13:56:35.837268    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.837503 kubelet[1452]: E1213 13:56:35.837479    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.837503 kubelet[1452]: W1213 13:56:35.837492    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.837503 kubelet[1452]: E1213 13:56:35.837502    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.837710 kubelet[1452]: E1213 13:56:35.837688    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.837710 kubelet[1452]: W1213 13:56:35.837703    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.837710 kubelet[1452]: E1213 13:56:35.837712    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.837892 kubelet[1452]: E1213 13:56:35.837872    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.837892 kubelet[1452]: W1213 13:56:35.837884    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.837892 kubelet[1452]: E1213 13:56:35.837893    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.838064 kubelet[1452]: E1213 13:56:35.838046    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.838094 kubelet[1452]: W1213 13:56:35.838057    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.838094 kubelet[1452]: E1213 13:56:35.838075    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.838226 kubelet[1452]: E1213 13:56:35.838203    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.838226 kubelet[1452]: W1213 13:56:35.838220    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.838226 kubelet[1452]: E1213 13:56:35.838229    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.838373 kubelet[1452]: E1213 13:56:35.838353    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.838373 kubelet[1452]: W1213 13:56:35.838370    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.838439 kubelet[1452]: E1213 13:56:35.838378    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.838551 kubelet[1452]: E1213 13:56:35.838530    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.838551 kubelet[1452]: W1213 13:56:35.838541    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.838551 kubelet[1452]: E1213 13:56:35.838549    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.838709 kubelet[1452]: E1213 13:56:35.838692    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.838709 kubelet[1452]: W1213 13:56:35.838702    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.838709 kubelet[1452]: E1213 13:56:35.838710    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.838859 kubelet[1452]: E1213 13:56:35.838843    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.838859 kubelet[1452]: W1213 13:56:35.838853    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.838912 kubelet[1452]: E1213 13:56:35.838861    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.839006 kubelet[1452]: E1213 13:56:35.838990    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.839006 kubelet[1452]: W1213 13:56:35.839000    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.839054 kubelet[1452]: E1213 13:56:35.839007    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.839160 kubelet[1452]: E1213 13:56:35.839139    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.839160 kubelet[1452]: W1213 13:56:35.839150    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.839160 kubelet[1452]: E1213 13:56:35.839157    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.839364 kubelet[1452]: E1213 13:56:35.839342    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.839364 kubelet[1452]: W1213 13:56:35.839353    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.839364 kubelet[1452]: E1213 13:56:35.839360    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.839518 kubelet[1452]: E1213 13:56:35.839497    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.839518 kubelet[1452]: W1213 13:56:35.839507    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.839518 kubelet[1452]: E1213 13:56:35.839514    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.839664 kubelet[1452]: E1213 13:56:35.839646    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.839664 kubelet[1452]: W1213 13:56:35.839656    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.839664 kubelet[1452]: E1213 13:56:35.839663    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.839815 kubelet[1452]: E1213 13:56:35.839796    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.839815 kubelet[1452]: W1213 13:56:35.839806    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.839815 kubelet[1452]: E1213 13:56:35.839813    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.839967 kubelet[1452]: E1213 13:56:35.839949    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.839967 kubelet[1452]: W1213 13:56:35.839959    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.839967 kubelet[1452]: E1213 13:56:35.839966    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.840119 kubelet[1452]: E1213 13:56:35.840099    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.840119 kubelet[1452]: W1213 13:56:35.840110    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.840119 kubelet[1452]: E1213 13:56:35.840118    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.840281 kubelet[1452]: E1213 13:56:35.840261    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.840281 kubelet[1452]: W1213 13:56:35.840272    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.840281 kubelet[1452]: E1213 13:56:35.840280    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.840443 kubelet[1452]: E1213 13:56:35.840421    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.840443 kubelet[1452]: W1213 13:56:35.840432    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.840443 kubelet[1452]: E1213 13:56:35.840439    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.857859 kubelet[1452]: E1213 13:56:35.857821    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.857859 kubelet[1452]: W1213 13:56:35.857844    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.857859 kubelet[1452]: E1213 13:56:35.857861    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.858049 kubelet[1452]: E1213 13:56:35.858034    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.858049 kubelet[1452]: W1213 13:56:35.858045    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.858097 kubelet[1452]: E1213 13:56:35.858054    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.858346 kubelet[1452]: E1213 13:56:35.858316    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.858346 kubelet[1452]: W1213 13:56:35.858330    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.858346 kubelet[1452]: E1213 13:56:35.858345    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.858517 kubelet[1452]: E1213 13:56:35.858492    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.858517 kubelet[1452]: W1213 13:56:35.858499    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.858517 kubelet[1452]: E1213 13:56:35.858512    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.858765 kubelet[1452]: E1213 13:56:35.858709    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.858765 kubelet[1452]: W1213 13:56:35.858717    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.858765 kubelet[1452]: E1213 13:56:35.858725    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.858978 kubelet[1452]: E1213 13:56:35.858904    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.858978 kubelet[1452]: W1213 13:56:35.858911    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.858978 kubelet[1452]: E1213 13:56:35.858919    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.859268 kubelet[1452]: E1213 13:56:35.859254    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.859403 kubelet[1452]: W1213 13:56:35.859274    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.859403 kubelet[1452]: E1213 13:56:35.859339    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.859484 kubelet[1452]: E1213 13:56:35.859422    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.859484 kubelet[1452]: W1213 13:56:35.859429    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.859484 kubelet[1452]: E1213 13:56:35.859438    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.859578 kubelet[1452]: E1213 13:56:35.859556    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.859578 kubelet[1452]: W1213 13:56:35.859569    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.859578 kubelet[1452]: E1213 13:56:35.859577    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.859712 kubelet[1452]: E1213 13:56:35.859686    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.859712 kubelet[1452]: W1213 13:56:35.859692    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.859712 kubelet[1452]: E1213 13:56:35.859699    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.859852 kubelet[1452]: E1213 13:56:35.859839    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.859852 kubelet[1452]: W1213 13:56:35.859849    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.859909 kubelet[1452]: E1213 13:56:35.859856    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.860188 kubelet[1452]: E1213 13:56:35.860168    1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Dec 13 13:56:35.860188 kubelet[1452]: W1213 13:56:35.860181    1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Dec 13 13:56:35.860270 kubelet[1452]: E1213 13:56:35.860190    1452 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Dec 13 13:56:35.969783 env[1206]: time="2024-12-13T13:56:35.969170842Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:35.971389 env[1206]: time="2024-12-13T13:56:35.971348822Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:35.972610 env[1206]: time="2024-12-13T13:56:35.972576503Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:35.973945 env[1206]: time="2024-12-13T13:56:35.973897997Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:35.974644 env[1206]: time="2024-12-13T13:56:35.974501915Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348\""
Dec 13 13:56:35.977388 env[1206]: time="2024-12-13T13:56:35.977337818Z" level=info msg="CreateContainer within sandbox \"e337b86b33c0483134753996a4427b868006567cde72646b060a78e82664476f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}"
Dec 13 13:56:36.002383 env[1206]: time="2024-12-13T13:56:36.002330163Z" level=info msg="CreateContainer within sandbox \"e337b86b33c0483134753996a4427b868006567cde72646b060a78e82664476f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"7edd92a59a94ec6fa890254f139c1fdab23345d6e6b132fc5bb749fdd77d9ace\""
Dec 13 13:56:36.006262 env[1206]: time="2024-12-13T13:56:36.003184209Z" level=info msg="StartContainer for \"7edd92a59a94ec6fa890254f139c1fdab23345d6e6b132fc5bb749fdd77d9ace\""
Dec 13 13:56:36.026902 systemd[1]: Started cri-containerd-7edd92a59a94ec6fa890254f139c1fdab23345d6e6b132fc5bb749fdd77d9ace.scope.
Dec 13 13:56:36.053000 audit[1788]: AVC avc:  denied  { perfmon } for  pid=1788 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.053000 audit[1788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1520 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:36.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646439326135396139346563366661383930323534663133396331
Dec 13 13:56:36.053000 audit[1788]: AVC avc:  denied  { bpf } for  pid=1788 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.053000 audit[1788]: AVC avc:  denied  { bpf } for  pid=1788 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.053000 audit[1788]: AVC avc:  denied  { bpf } for  pid=1788 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.053000 audit[1788]: AVC avc:  denied  { perfmon } for  pid=1788 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.053000 audit[1788]: AVC avc:  denied  { perfmon } for  pid=1788 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.053000 audit[1788]: AVC avc:  denied  { perfmon } for  pid=1788 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.053000 audit[1788]: AVC avc:  denied  { perfmon } for  pid=1788 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.053000 audit[1788]: AVC avc:  denied  { perfmon } for  pid=1788 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.053000 audit[1788]: AVC avc:  denied  { bpf } for  pid=1788 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.053000 audit[1788]: AVC avc:  denied  { bpf } for  pid=1788 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.053000 audit: BPF prog-id=66 op=LOAD
Dec 13 13:56:36.053000 audit[1788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1520 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:36.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646439326135396139346563366661383930323534663133396331
Dec 13 13:56:36.054000 audit[1788]: AVC avc:  denied  { bpf } for  pid=1788 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.054000 audit[1788]: AVC avc:  denied  { bpf } for  pid=1788 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.054000 audit[1788]: AVC avc:  denied  { perfmon } for  pid=1788 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.054000 audit[1788]: AVC avc:  denied  { perfmon } for  pid=1788 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.054000 audit[1788]: AVC avc:  denied  { perfmon } for  pid=1788 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.054000 audit[1788]: AVC avc:  denied  { perfmon } for  pid=1788 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.054000 audit[1788]: AVC avc:  denied  { perfmon } for  pid=1788 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.054000 audit[1788]: AVC avc:  denied  { bpf } for  pid=1788 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.054000 audit[1788]: AVC avc:  denied  { bpf } for  pid=1788 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.054000 audit: BPF prog-id=67 op=LOAD
Dec 13 13:56:36.054000 audit[1788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1520 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:36.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646439326135396139346563366661383930323534663133396331
Dec 13 13:56:36.055000 audit: BPF prog-id=67 op=UNLOAD
Dec 13 13:56:36.055000 audit: BPF prog-id=66 op=UNLOAD
Dec 13 13:56:36.055000 audit[1788]: AVC avc:  denied  { bpf } for  pid=1788 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.055000 audit[1788]: AVC avc:  denied  { bpf } for  pid=1788 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.055000 audit[1788]: AVC avc:  denied  { bpf } for  pid=1788 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.055000 audit[1788]: AVC avc:  denied  { perfmon } for  pid=1788 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.055000 audit[1788]: AVC avc:  denied  { perfmon } for  pid=1788 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.055000 audit[1788]: AVC avc:  denied  { perfmon } for  pid=1788 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.055000 audit[1788]: AVC avc:  denied  { perfmon } for  pid=1788 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.055000 audit[1788]: AVC avc:  denied  { perfmon } for  pid=1788 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.055000 audit[1788]: AVC avc:  denied  { bpf } for  pid=1788 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.055000 audit[1788]: AVC avc:  denied  { bpf } for  pid=1788 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:36.055000 audit: BPF prog-id=68 op=LOAD
Dec 13 13:56:36.055000 audit[1788]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1520 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:36.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765646439326135396139346563366661383930323534663133396331
Dec 13 13:56:36.080370 env[1206]: time="2024-12-13T13:56:36.080320358Z" level=info msg="StartContainer for \"7edd92a59a94ec6fa890254f139c1fdab23345d6e6b132fc5bb749fdd77d9ace\" returns successfully"
Dec 13 13:56:36.109899 systemd[1]: cri-containerd-7edd92a59a94ec6fa890254f139c1fdab23345d6e6b132fc5bb749fdd77d9ace.scope: Deactivated successfully.
Dec 13 13:56:36.115000 audit: BPF prog-id=68 op=UNLOAD
Dec 13 13:56:36.126723 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7edd92a59a94ec6fa890254f139c1fdab23345d6e6b132fc5bb749fdd77d9ace-rootfs.mount: Deactivated successfully.
Dec 13 13:56:36.296562 env[1206]: time="2024-12-13T13:56:36.296444933Z" level=info msg="shim disconnected" id=7edd92a59a94ec6fa890254f139c1fdab23345d6e6b132fc5bb749fdd77d9ace
Dec 13 13:56:36.296562 env[1206]: time="2024-12-13T13:56:36.296492650Z" level=warning msg="cleaning up after shim disconnected" id=7edd92a59a94ec6fa890254f139c1fdab23345d6e6b132fc5bb749fdd77d9ace namespace=k8s.io
Dec 13 13:56:36.296562 env[1206]: time="2024-12-13T13:56:36.296502639Z" level=info msg="cleaning up dead shim"
Dec 13 13:56:36.304596 env[1206]: time="2024-12-13T13:56:36.304551799Z" level=warning msg="cleanup warnings time=\"2024-12-13T13:56:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1826 runtime=io.containerd.runc.v2\n"
Dec 13 13:56:36.607792 kubelet[1452]: E1213 13:56:36.607584    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:36.784120 kubelet[1452]: E1213 13:56:36.783778    1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 13:56:36.784120 kubelet[1452]: E1213 13:56:36.783819    1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 13:56:36.784547 env[1206]: time="2024-12-13T13:56:36.784500984Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\""
Dec 13 13:56:37.607843 kubelet[1452]: E1213 13:56:37.607801    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:37.770967 kubelet[1452]: E1213 13:56:37.770905    1452 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6tkwm" podUID="8da14905-625a-4f83-a34c-8ea13d6ed11a"
Dec 13 13:56:38.608435 kubelet[1452]: E1213 13:56:38.608389    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:39.592213 env[1206]: time="2024-12-13T13:56:39.592170619Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:39.595926 env[1206]: time="2024-12-13T13:56:39.595887225Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:39.597516 env[1206]: time="2024-12-13T13:56:39.597489562Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:39.598777 env[1206]: time="2024-12-13T13:56:39.598749505Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:39.599415 env[1206]: time="2024-12-13T13:56:39.599390918Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f\""
Dec 13 13:56:39.601580 env[1206]: time="2024-12-13T13:56:39.601550434Z" level=info msg="CreateContainer within sandbox \"e337b86b33c0483134753996a4427b868006567cde72646b060a78e82664476f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}"
Dec 13 13:56:39.609081 kubelet[1452]: E1213 13:56:39.609039    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:39.621991 env[1206]: time="2024-12-13T13:56:39.621935243Z" level=info msg="CreateContainer within sandbox \"e337b86b33c0483134753996a4427b868006567cde72646b060a78e82664476f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"548b178f5a56bc21a679b2be534e1e26874bca61b680afd08840fecf50ff053e\""
Dec 13 13:56:39.622526 env[1206]: time="2024-12-13T13:56:39.622494575Z" level=info msg="StartContainer for \"548b178f5a56bc21a679b2be534e1e26874bca61b680afd08840fecf50ff053e\""
Dec 13 13:56:39.642925 systemd[1]: Started cri-containerd-548b178f5a56bc21a679b2be534e1e26874bca61b680afd08840fecf50ff053e.scope.
Dec 13 13:56:39.665000 audit[1851]: AVC avc:  denied  { perfmon } for  pid=1851 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.665000 audit[1851]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1520 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:39.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534386231373866356135366263323161363739623262653533346531
Dec 13 13:56:39.665000 audit[1851]: AVC avc:  denied  { bpf } for  pid=1851 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.665000 audit[1851]: AVC avc:  denied  { bpf } for  pid=1851 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.665000 audit[1851]: AVC avc:  denied  { bpf } for  pid=1851 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.665000 audit[1851]: AVC avc:  denied  { perfmon } for  pid=1851 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.665000 audit[1851]: AVC avc:  denied  { perfmon } for  pid=1851 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.665000 audit[1851]: AVC avc:  denied  { perfmon } for  pid=1851 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.665000 audit[1851]: AVC avc:  denied  { perfmon } for  pid=1851 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.665000 audit[1851]: AVC avc:  denied  { perfmon } for  pid=1851 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.665000 audit[1851]: AVC avc:  denied  { bpf } for  pid=1851 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.665000 audit[1851]: AVC avc:  denied  { bpf } for  pid=1851 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.665000 audit: BPF prog-id=69 op=LOAD
Dec 13 13:56:39.665000 audit[1851]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1520 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:39.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534386231373866356135366263323161363739623262653533346531
Dec 13 13:56:39.666000 audit[1851]: AVC avc:  denied  { bpf } for  pid=1851 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.666000 audit[1851]: AVC avc:  denied  { bpf } for  pid=1851 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.666000 audit[1851]: AVC avc:  denied  { perfmon } for  pid=1851 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.666000 audit[1851]: AVC avc:  denied  { perfmon } for  pid=1851 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.666000 audit[1851]: AVC avc:  denied  { perfmon } for  pid=1851 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.666000 audit[1851]: AVC avc:  denied  { perfmon } for  pid=1851 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.666000 audit[1851]: AVC avc:  denied  { perfmon } for  pid=1851 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.666000 audit[1851]: AVC avc:  denied  { bpf } for  pid=1851 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.666000 audit[1851]: AVC avc:  denied  { bpf } for  pid=1851 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.666000 audit: BPF prog-id=70 op=LOAD
Dec 13 13:56:39.666000 audit[1851]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1520 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:39.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534386231373866356135366263323161363739623262653533346531
Dec 13 13:56:39.666000 audit: BPF prog-id=70 op=UNLOAD
Dec 13 13:56:39.666000 audit: BPF prog-id=69 op=UNLOAD
Dec 13 13:56:39.666000 audit[1851]: AVC avc:  denied  { bpf } for  pid=1851 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.666000 audit[1851]: AVC avc:  denied  { bpf } for  pid=1851 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.666000 audit[1851]: AVC avc:  denied  { bpf } for  pid=1851 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.666000 audit[1851]: AVC avc:  denied  { perfmon } for  pid=1851 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.666000 audit[1851]: AVC avc:  denied  { perfmon } for  pid=1851 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.666000 audit[1851]: AVC avc:  denied  { perfmon } for  pid=1851 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.666000 audit[1851]: AVC avc:  denied  { perfmon } for  pid=1851 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.666000 audit[1851]: AVC avc:  denied  { perfmon } for  pid=1851 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.666000 audit[1851]: AVC avc:  denied  { bpf } for  pid=1851 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.666000 audit[1851]: AVC avc:  denied  { bpf } for  pid=1851 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:39.666000 audit: BPF prog-id=71 op=LOAD
Dec 13 13:56:39.666000 audit[1851]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1520 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:39.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534386231373866356135366263323161363739623262653533346531
Dec 13 13:56:39.690222 env[1206]: time="2024-12-13T13:56:39.688936252Z" level=info msg="StartContainer for \"548b178f5a56bc21a679b2be534e1e26874bca61b680afd08840fecf50ff053e\" returns successfully"
Dec 13 13:56:39.771396 kubelet[1452]: E1213 13:56:39.771265    1452 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6tkwm" podUID="8da14905-625a-4f83-a34c-8ea13d6ed11a"
Dec 13 13:56:39.790508 kubelet[1452]: E1213 13:56:39.790394    1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 13:56:40.268370 env[1206]: time="2024-12-13T13:56:40.268314096Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Dec 13 13:56:40.270495 systemd[1]: cri-containerd-548b178f5a56bc21a679b2be534e1e26874bca61b680afd08840fecf50ff053e.scope: Deactivated successfully.
Dec 13 13:56:40.278000 audit: BPF prog-id=71 op=UNLOAD
Dec 13 13:56:40.279517 kernel: kauditd_printk_skb: 273 callbacks suppressed
Dec 13 13:56:40.279573 kernel: audit: type=1334 audit(1734098200.278:518): prog-id=71 op=UNLOAD
Dec 13 13:56:40.305228 kubelet[1452]: I1213 13:56:40.304988    1452 kubelet_node_status.go:497] "Fast updating node status as it just became ready"
Dec 13 13:56:40.379936 env[1206]: time="2024-12-13T13:56:40.379878920Z" level=info msg="shim disconnected" id=548b178f5a56bc21a679b2be534e1e26874bca61b680afd08840fecf50ff053e
Dec 13 13:56:40.379936 env[1206]: time="2024-12-13T13:56:40.379924703Z" level=warning msg="cleaning up after shim disconnected" id=548b178f5a56bc21a679b2be534e1e26874bca61b680afd08840fecf50ff053e namespace=k8s.io
Dec 13 13:56:40.379936 env[1206]: time="2024-12-13T13:56:40.379935670Z" level=info msg="cleaning up dead shim"
Dec 13 13:56:40.386976 env[1206]: time="2024-12-13T13:56:40.386924546Z" level=warning msg="cleanup warnings time=\"2024-12-13T13:56:40Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1893 runtime=io.containerd.runc.v2\n"
Dec 13 13:56:40.610020 kubelet[1452]: E1213 13:56:40.609893    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:40.615397 systemd[1]: run-containerd-runc-k8s.io-548b178f5a56bc21a679b2be534e1e26874bca61b680afd08840fecf50ff053e-runc.DzDAm3.mount: Deactivated successfully.
Dec 13 13:56:40.615488 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-548b178f5a56bc21a679b2be534e1e26874bca61b680afd08840fecf50ff053e-rootfs.mount: Deactivated successfully.
Dec 13 13:56:40.792822 kubelet[1452]: E1213 13:56:40.792776    1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 13:56:40.793599 env[1206]: time="2024-12-13T13:56:40.793555591Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\""
Dec 13 13:56:41.610975 kubelet[1452]: E1213 13:56:41.610898    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:41.775667 systemd[1]: Created slice kubepods-besteffort-pod8da14905_625a_4f83_a34c_8ea13d6ed11a.slice.
Dec 13 13:56:41.779362 env[1206]: time="2024-12-13T13:56:41.779313502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6tkwm,Uid:8da14905-625a-4f83-a34c-8ea13d6ed11a,Namespace:calico-system,Attempt:0,}"
Dec 13 13:56:41.916115 kubelet[1452]: I1213 13:56:41.915966    1452 topology_manager.go:215] "Topology Admit Handler" podUID="1646a1a4-8cfe-4cb8-8267-3eda01835546" podNamespace="default" podName="nginx-deployment-85f456d6dd-f45xp"
Dec 13 13:56:41.920887 systemd[1]: Created slice kubepods-besteffort-pod1646a1a4_8cfe_4cb8_8267_3eda01835546.slice.
Dec 13 13:56:41.990827 env[1206]: time="2024-12-13T13:56:41.990754562Z" level=error msg="Failed to destroy network for sandbox \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 13:56:41.991526 env[1206]: time="2024-12-13T13:56:41.991489924Z" level=error msg="encountered an error cleaning up failed sandbox \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 13:56:41.991664 env[1206]: time="2024-12-13T13:56:41.991636063Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6tkwm,Uid:8da14905-625a-4f83-a34c-8ea13d6ed11a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 13:56:41.993286 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148-shm.mount: Deactivated successfully.
Dec 13 13:56:41.994028 kubelet[1452]: E1213 13:56:41.993967    1452 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 13:56:41.994095 kubelet[1452]: E1213 13:56:41.994050    1452 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6tkwm"
Dec 13 13:56:41.994095 kubelet[1452]: E1213 13:56:41.994073    1452 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6tkwm"
Dec 13 13:56:41.994159 kubelet[1452]: E1213 13:56:41.994125    1452 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-6tkwm_calico-system(8da14905-625a-4f83-a34c-8ea13d6ed11a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-6tkwm_calico-system(8da14905-625a-4f83-a34c-8ea13d6ed11a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6tkwm" podUID="8da14905-625a-4f83-a34c-8ea13d6ed11a"
Dec 13 13:56:41.995137 kubelet[1452]: I1213 13:56:41.995113    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sc2k8\" (UniqueName: \"kubernetes.io/projected/1646a1a4-8cfe-4cb8-8267-3eda01835546-kube-api-access-sc2k8\") pod \"nginx-deployment-85f456d6dd-f45xp\" (UID: \"1646a1a4-8cfe-4cb8-8267-3eda01835546\") " pod="default/nginx-deployment-85f456d6dd-f45xp"
Dec 13 13:56:42.223646 env[1206]: time="2024-12-13T13:56:42.223543189Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-f45xp,Uid:1646a1a4-8cfe-4cb8-8267-3eda01835546,Namespace:default,Attempt:0,}"
Dec 13 13:56:42.272549 env[1206]: time="2024-12-13T13:56:42.272490459Z" level=error msg="Failed to destroy network for sandbox \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 13:56:42.272872 env[1206]: time="2024-12-13T13:56:42.272841817Z" level=error msg="encountered an error cleaning up failed sandbox \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 13:56:42.272922 env[1206]: time="2024-12-13T13:56:42.272892701Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-f45xp,Uid:1646a1a4-8cfe-4cb8-8267-3eda01835546,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 13:56:42.273519 kubelet[1452]: E1213 13:56:42.273111    1452 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 13:56:42.273519 kubelet[1452]: E1213 13:56:42.273180    1452 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-f45xp"
Dec 13 13:56:42.273519 kubelet[1452]: E1213 13:56:42.273200    1452 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-85f456d6dd-f45xp"
Dec 13 13:56:42.273662 kubelet[1452]: E1213 13:56:42.273259    1452 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-85f456d6dd-f45xp_default(1646a1a4-8cfe-4cb8-8267-3eda01835546)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-85f456d6dd-f45xp_default(1646a1a4-8cfe-4cb8-8267-3eda01835546)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-f45xp" podUID="1646a1a4-8cfe-4cb8-8267-3eda01835546"
Dec 13 13:56:42.611409 kubelet[1452]: E1213 13:56:42.611221    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:42.801136 kubelet[1452]: I1213 13:56:42.801094    1452 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31"
Dec 13 13:56:42.801908 env[1206]: time="2024-12-13T13:56:42.801871457Z" level=info msg="StopPodSandbox for \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\""
Dec 13 13:56:42.802935 kubelet[1452]: I1213 13:56:42.802912    1452 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148"
Dec 13 13:56:42.803451 env[1206]: time="2024-12-13T13:56:42.803418127Z" level=info msg="StopPodSandbox for \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\""
Dec 13 13:56:42.829409 env[1206]: time="2024-12-13T13:56:42.829350673Z" level=error msg="StopPodSandbox for \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\" failed" error="failed to destroy network for sandbox \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 13:56:42.829907 kubelet[1452]: E1213 13:56:42.829705    1452 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31"
Dec 13 13:56:42.829907 kubelet[1452]: E1213 13:56:42.829770    1452 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31"}
Dec 13 13:56:42.829907 kubelet[1452]: E1213 13:56:42.829840    1452 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1646a1a4-8cfe-4cb8-8267-3eda01835546\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Dec 13 13:56:42.829907 kubelet[1452]: E1213 13:56:42.829863    1452 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1646a1a4-8cfe-4cb8-8267-3eda01835546\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-85f456d6dd-f45xp" podUID="1646a1a4-8cfe-4cb8-8267-3eda01835546"
Dec 13 13:56:42.837366 env[1206]: time="2024-12-13T13:56:42.837315459Z" level=error msg="StopPodSandbox for \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\" failed" error="failed to destroy network for sandbox \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Dec 13 13:56:42.837859 kubelet[1452]: E1213 13:56:42.837699    1452 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148"
Dec 13 13:56:42.837859 kubelet[1452]: E1213 13:56:42.837741    1452 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148"}
Dec 13 13:56:42.837859 kubelet[1452]: E1213 13:56:42.837788    1452 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8da14905-625a-4f83-a34c-8ea13d6ed11a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Dec 13 13:56:42.837859 kubelet[1452]: E1213 13:56:42.837809    1452 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8da14905-625a-4f83-a34c-8ea13d6ed11a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6tkwm" podUID="8da14905-625a-4f83-a34c-8ea13d6ed11a"
Dec 13 13:56:43.612261 kubelet[1452]: E1213 13:56:43.612191    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:44.612550 kubelet[1452]: E1213 13:56:44.612489    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:45.017370 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2890834692.mount: Deactivated successfully.
Dec 13 13:56:45.361163 env[1206]: time="2024-12-13T13:56:45.360855737Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:45.363413 env[1206]: time="2024-12-13T13:56:45.363369936Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:45.365342 env[1206]: time="2024-12-13T13:56:45.365316483Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:45.366098 env[1206]: time="2024-12-13T13:56:45.366074126Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:45.366573 env[1206]: time="2024-12-13T13:56:45.366544887Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758\""
Dec 13 13:56:45.377986 env[1206]: time="2024-12-13T13:56:45.377942197Z" level=info msg="CreateContainer within sandbox \"e337b86b33c0483134753996a4427b868006567cde72646b060a78e82664476f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}"
Dec 13 13:56:45.391297 env[1206]: time="2024-12-13T13:56:45.391231777Z" level=info msg="CreateContainer within sandbox \"e337b86b33c0483134753996a4427b868006567cde72646b060a78e82664476f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7a99bcb3b278dd21d8ea85fb0123d3747d33f8b3901aa27601da60e0af7f49e1\""
Dec 13 13:56:45.391690 env[1206]: time="2024-12-13T13:56:45.391665076Z" level=info msg="StartContainer for \"7a99bcb3b278dd21d8ea85fb0123d3747d33f8b3901aa27601da60e0af7f49e1\""
Dec 13 13:56:45.405935 systemd[1]: Started cri-containerd-7a99bcb3b278dd21d8ea85fb0123d3747d33f8b3901aa27601da60e0af7f49e1.scope.
Dec 13 13:56:45.434000 audit[2042]: AVC avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.434000 audit[2042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1520 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:45.440191 kernel: audit: type=1400 audit(1734098205.434:519): avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.440265 kernel: audit: type=1300 audit(1734098205.434:519): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1520 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:45.440297 kernel: audit: type=1327 audit(1734098205.434:519): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393962636233623237386464323164386561383566623031323364
Dec 13 13:56:45.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393962636233623237386464323164386561383566623031323364
Dec 13 13:56:45.442602 kernel: audit: type=1400 audit(1734098205.434:520): avc:  denied  { bpf } for  pid=2042 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.434000 audit[2042]: AVC avc:  denied  { bpf } for  pid=2042 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.434000 audit[2042]: AVC avc:  denied  { bpf } for  pid=2042 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.446109 kernel: audit: type=1400 audit(1734098205.434:520): avc:  denied  { bpf } for  pid=2042 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.434000 audit[2042]: AVC avc:  denied  { bpf } for  pid=2042 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.448338 kernel: audit: type=1400 audit(1734098205.434:520): avc:  denied  { bpf } for  pid=2042 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.448389 kernel: audit: type=1400 audit(1734098205.434:520): avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.434000 audit[2042]: AVC avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.450094 kernel: audit: type=1400 audit(1734098205.434:520): avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.434000 audit[2042]: AVC avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.453160 kernel: audit: type=1400 audit(1734098205.434:520): avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.434000 audit[2042]: AVC avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.453431 kernel: audit: type=1400 audit(1734098205.434:520): avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.434000 audit[2042]: AVC avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.434000 audit[2042]: AVC avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.434000 audit[2042]: AVC avc:  denied  { bpf } for  pid=2042 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.434000 audit[2042]: AVC avc:  denied  { bpf } for  pid=2042 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.434000 audit: BPF prog-id=72 op=LOAD
Dec 13 13:56:45.434000 audit[2042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1520 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:45.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393962636233623237386464323164386561383566623031323364
Dec 13 13:56:45.436000 audit[2042]: AVC avc:  denied  { bpf } for  pid=2042 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.436000 audit[2042]: AVC avc:  denied  { bpf } for  pid=2042 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.436000 audit[2042]: AVC avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.436000 audit[2042]: AVC avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.436000 audit[2042]: AVC avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.436000 audit[2042]: AVC avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.436000 audit[2042]: AVC avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.436000 audit[2042]: AVC avc:  denied  { bpf } for  pid=2042 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.436000 audit[2042]: AVC avc:  denied  { bpf } for  pid=2042 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.436000 audit: BPF prog-id=73 op=LOAD
Dec 13 13:56:45.436000 audit[2042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1520 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:45.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393962636233623237386464323164386561383566623031323364
Dec 13 13:56:45.439000 audit: BPF prog-id=73 op=UNLOAD
Dec 13 13:56:45.439000 audit: BPF prog-id=72 op=UNLOAD
Dec 13 13:56:45.439000 audit[2042]: AVC avc:  denied  { bpf } for  pid=2042 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.439000 audit[2042]: AVC avc:  denied  { bpf } for  pid=2042 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.439000 audit[2042]: AVC avc:  denied  { bpf } for  pid=2042 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.439000 audit[2042]: AVC avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.439000 audit[2042]: AVC avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.439000 audit[2042]: AVC avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.439000 audit[2042]: AVC avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.439000 audit[2042]: AVC avc:  denied  { perfmon } for  pid=2042 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.439000 audit[2042]: AVC avc:  denied  { bpf } for  pid=2042 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.439000 audit[2042]: AVC avc:  denied  { bpf } for  pid=2042 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:45.439000 audit: BPF prog-id=74 op=LOAD
Dec 13 13:56:45.439000 audit[2042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1520 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:45.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761393962636233623237386464323164386561383566623031323364
Dec 13 13:56:45.467258 env[1206]: time="2024-12-13T13:56:45.466094504Z" level=info msg="StartContainer for \"7a99bcb3b278dd21d8ea85fb0123d3747d33f8b3901aa27601da60e0af7f49e1\" returns successfully"
Dec 13 13:56:45.612872 kubelet[1452]: E1213 13:56:45.612766    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:45.630657 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information.
Dec 13 13:56:45.630754 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
Dec 13 13:56:45.809256 kubelet[1452]: E1213 13:56:45.809156    1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 13:56:46.613673 kubelet[1452]: E1213 13:56:46.613623    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:46.809898 kubelet[1452]: I1213 13:56:46.809856    1452 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness"
Dec 13 13:56:46.810640 kubelet[1452]: E1213 13:56:46.810590    1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 13:56:46.883000 audit[2152]: AVC avc:  denied  { write } for  pid=2152 comm="tee" name="fd" dev="proc" ino=13192 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 13:56:46.883000 audit[2152]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffa821a2a a2=241 a3=1b6 items=1 ppid=2111 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:46.883000 audit: CWD cwd="/etc/service/enabled/felix/log"
Dec 13 13:56:46.883000 audit: PATH item=0 name="/dev/fd/63" inode=15454 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 13:56:46.883000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 13:56:46.885000 audit[2156]: AVC avc:  denied  { write } for  pid=2156 comm="tee" name="fd" dev="proc" ino=13995 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 13:56:46.885000 audit[2156]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffff9e1a1a a2=241 a3=1b6 items=1 ppid=2119 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:46.885000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log"
Dec 13 13:56:46.885000 audit: PATH item=0 name="/dev/fd/63" inode=15455 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 13:56:46.885000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 13:56:46.889000 audit[2158]: AVC avc:  denied  { write } for  pid=2158 comm="tee" name="fd" dev="proc" ino=14001 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 13:56:46.889000 audit[2158]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe7efaa1b a2=241 a3=1b6 items=1 ppid=2120 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:46.889000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log"
Dec 13 13:56:46.889000 audit: PATH item=0 name="/dev/fd/63" inode=15456 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 13:56:46.889000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 13:56:46.891000 audit[2170]: AVC avc:  denied  { write } for  pid=2170 comm="tee" name="fd" dev="proc" ino=14006 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 13:56:46.891000 audit[2170]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffaadba2a a2=241 a3=1b6 items=1 ppid=2117 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:46.891000 audit: CWD cwd="/etc/service/enabled/confd/log"
Dec 13 13:56:46.891000 audit: PATH item=0 name="/dev/fd/63" inode=14656 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 13:56:46.891000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 13:56:46.898000 audit[2161]: AVC avc:  denied  { write } for  pid=2161 comm="tee" name="fd" dev="proc" ino=14663 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 13:56:46.898000 audit[2161]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffddefa2c a2=241 a3=1b6 items=1 ppid=2112 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:46.898000 audit: CWD cwd="/etc/service/enabled/cni/log"
Dec 13 13:56:46.898000 audit: PATH item=0 name="/dev/fd/63" inode=13992 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 13:56:46.898000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 13:56:46.904000 audit[2180]: AVC avc:  denied  { write } for  pid=2180 comm="tee" name="fd" dev="proc" ino=15459 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 13:56:46.904000 audit[2180]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe16eaa2b a2=241 a3=1b6 items=1 ppid=2116 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:46.904000 audit: CWD cwd="/etc/service/enabled/bird/log"
Dec 13 13:56:46.904000 audit: PATH item=0 name="/dev/fd/63" inode=14005 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 13:56:46.904000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 13:56:46.912000 audit[2193]: AVC avc:  denied  { write } for  pid=2193 comm="tee" name="fd" dev="proc" ino=15470 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Dec 13 13:56:46.912000 audit[2193]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffef82aa2a a2=241 a3=1b6 items=1 ppid=2110 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:46.912000 audit: CWD cwd="/etc/service/enabled/bird6/log"
Dec 13 13:56:46.912000 audit: PATH item=0 name="/dev/fd/63" inode=14015 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 13:56:46.912000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit: BPF prog-id=75 op=LOAD
Dec 13 13:56:47.000000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffad8d3c8 a2=98 a3=fffffad8d3b8 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.000000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.000000 audit: BPF prog-id=75 op=UNLOAD
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit: BPF prog-id=76 op=LOAD
Dec 13 13:56:47.000000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffad8d058 a2=74 a3=95 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.000000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.000000 audit: BPF prog-id=76 op=UNLOAD
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.000000 audit: BPF prog-id=77 op=LOAD
Dec 13 13:56:47.000000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffad8d0b8 a2=94 a3=2 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.000000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.000000 audit: BPF prog-id=77 op=UNLOAD
Dec 13 13:56:47.083000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.083000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.083000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.083000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.083000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.083000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.083000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.083000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.083000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.083000 audit: BPF prog-id=78 op=LOAD
Dec 13 13:56:47.083000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffad8d078 a2=40 a3=fffffad8d0a8 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.083000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.083000 audit: BPF prog-id=78 op=UNLOAD
Dec 13 13:56:47.083000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.083000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffffad8d190 a2=50 a3=0 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.083000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffad8d0e8 a2=28 a3=fffffad8d218 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffad8d118 a2=28 a3=fffffad8d248 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffad8cfc8 a2=28 a3=fffffad8d0f8 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffad8d138 a2=28 a3=fffffad8d268 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffad8d118 a2=28 a3=fffffad8d248 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffad8d108 a2=28 a3=fffffad8d238 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffad8d138 a2=28 a3=fffffad8d268 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffad8d118 a2=28 a3=fffffad8d248 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffad8d138 a2=28 a3=fffffad8d268 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffad8d108 a2=28 a3=fffffad8d238 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffad8d188 a2=28 a3=fffffad8d2c8 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffad8cec0 a2=50 a3=0 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit: BPF prog-id=79 op=LOAD
Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffad8cec8 a2=94 a3=5 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.092000 audit: BPF prog-id=79 op=UNLOAD
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffad8cfd0 a2=50 a3=0 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffffad8d118 a2=4 a3=3 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.092000 audit[2231]: AVC avc:  denied  { confidentiality } for  pid=2231 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:56:47.092000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffad8d0f8 a2=94 a3=6 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.092000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.093000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.093000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.093000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.093000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.093000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.093000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.093000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.093000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.093000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.093000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.093000 audit[2231]: AVC avc:  denied  { confidentiality } for  pid=2231 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:56:47.093000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffad8c8c8 a2=94 a3=83 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.093000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.093000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.093000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.093000 audit[2231]: AVC avc:  denied  { bpf } for  pid=2231 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.093000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.093000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.093000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.093000 audit[2231]: AVC avc:  denied  { perfmon } for  pid=2231 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.093000 audit[2231]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffad8c8c8 a2=94 a3=83 items=0 ppid=2115 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.093000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { bpf } for  pid=2234 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { bpf } for  pid=2234 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { perfmon } for  pid=2234 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { perfmon } for  pid=2234 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { perfmon } for  pid=2234 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { perfmon } for  pid=2234 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { perfmon } for  pid=2234 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { bpf } for  pid=2234 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { bpf } for  pid=2234 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit: BPF prog-id=80 op=LOAD
Dec 13 13:56:47.104000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe92c4078 a2=98 a3=ffffe92c4068 items=0 ppid=2115 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.104000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F
Dec 13 13:56:47.104000 audit: BPF prog-id=80 op=UNLOAD
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { bpf } for  pid=2234 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { bpf } for  pid=2234 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { perfmon } for  pid=2234 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { perfmon } for  pid=2234 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { perfmon } for  pid=2234 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { perfmon } for  pid=2234 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { perfmon } for  pid=2234 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { bpf } for  pid=2234 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { bpf } for  pid=2234 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit: BPF prog-id=81 op=LOAD
Dec 13 13:56:47.104000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe92c3f28 a2=74 a3=95 items=0 ppid=2115 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.104000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F
Dec 13 13:56:47.104000 audit: BPF prog-id=81 op=UNLOAD
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { bpf } for  pid=2234 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { bpf } for  pid=2234 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { perfmon } for  pid=2234 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { perfmon } for  pid=2234 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { perfmon } for  pid=2234 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { perfmon } for  pid=2234 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { perfmon } for  pid=2234 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { bpf } for  pid=2234 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit[2234]: AVC avc:  denied  { bpf } for  pid=2234 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.104000 audit: BPF prog-id=82 op=LOAD
Dec 13 13:56:47.104000 audit[2234]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe92c3f58 a2=40 a3=ffffe92c3f88 items=0 ppid=2115 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.104000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F
Dec 13 13:56:47.104000 audit: BPF prog-id=82 op=UNLOAD
Dec 13 13:56:47.151801 systemd-networkd[1035]: vxlan.calico: Link UP
Dec 13 13:56:47.151810 systemd-networkd[1035]: vxlan.calico: Gained carrier
Dec 13 13:56:47.169000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.169000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.169000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.169000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.169000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.169000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.169000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.169000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.169000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.169000 audit: BPF prog-id=83 op=LOAD
Dec 13 13:56:47.169000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdfe70708 a2=98 a3=ffffdfe706f8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.169000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 13:56:47.170000 audit: BPF prog-id=83 op=UNLOAD
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit: BPF prog-id=84 op=LOAD
Dec 13 13:56:47.170000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdfe703e8 a2=74 a3=95 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.170000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 13:56:47.170000 audit: BPF prog-id=84 op=UNLOAD
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit: BPF prog-id=85 op=LOAD
Dec 13 13:56:47.170000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdfe70448 a2=94 a3=2 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.170000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 13:56:47.170000 audit: BPF prog-id=85 op=UNLOAD
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdfe70478 a2=28 a3=ffffdfe705a8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.170000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdfe704a8 a2=28 a3=ffffdfe705d8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.170000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdfe70358 a2=28 a3=ffffdfe70488 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.170000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdfe704c8 a2=28 a3=ffffdfe705f8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.170000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdfe704a8 a2=28 a3=ffffdfe705d8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.170000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 13:56:47.170000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.170000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdfe70498 a2=28 a3=ffffdfe705c8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.170000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 13:56:47.173000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.173000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdfe704c8 a2=28 a3=ffffdfe705f8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 13:56:47.173000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.173000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdfe704a8 a2=28 a3=ffffdfe705d8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 13:56:47.173000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.173000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdfe704c8 a2=28 a3=ffffdfe705f8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 13:56:47.173000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.173000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdfe70498 a2=28 a3=ffffdfe705c8 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 13:56:47.173000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.173000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffdfe70518 a2=28 a3=ffffdfe70658 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 13:56:47.173000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.173000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.173000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.173000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.173000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.173000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.173000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.173000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.173000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.173000 audit: BPF prog-id=86 op=LOAD
Dec 13 13:56:47.173000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdfe70338 a2=40 a3=ffffdfe70368 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.173000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 13:56:47.173000 audit: BPF prog-id=86 op=UNLOAD
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffdfe70360 a2=50 a3=0 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.174000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffdfe70360 a2=50 a3=0 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.174000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit: BPF prog-id=87 op=LOAD
Dec 13 13:56:47.174000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdfe6fac8 a2=94 a3=2 items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.174000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 13:56:47.174000 audit: BPF prog-id=87 op=UNLOAD
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { perfmon } for  pid=2262 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit[2262]: AVC avc:  denied  { bpf } for  pid=2262 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.174000 audit: BPF prog-id=88 op=LOAD
Dec 13 13:56:47.174000 audit[2262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdfe6fc58 a2=94 a3=2d items=0 ppid=2115 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.174000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit: BPF prog-id=89 op=LOAD
Dec 13 13:56:47.179000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff3eac638 a2=98 a3=fffff3eac628 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.179000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.179000 audit: BPF prog-id=89 op=UNLOAD
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit: BPF prog-id=90 op=LOAD
Dec 13 13:56:47.179000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff3eac2c8 a2=74 a3=95 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.179000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.179000 audit: BPF prog-id=90 op=UNLOAD
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.179000 audit: BPF prog-id=91 op=LOAD
Dec 13 13:56:47.179000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff3eac328 a2=94 a3=2 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.179000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.179000 audit: BPF prog-id=91 op=UNLOAD
Dec 13 13:56:47.262000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.262000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.262000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.262000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.262000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.262000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.262000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.262000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.262000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.262000 audit: BPF prog-id=92 op=LOAD
Dec 13 13:56:47.262000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff3eac2e8 a2=40 a3=fffff3eac318 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.262000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.262000 audit: BPF prog-id=92 op=UNLOAD
Dec 13 13:56:47.262000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.262000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff3eac400 a2=50 a3=0 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.262000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.271000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.271000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff3eac358 a2=28 a3=fffff3eac488 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.271000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.271000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff3eac388 a2=28 a3=fffff3eac4b8 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.271000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.271000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff3eac238 a2=28 a3=fffff3eac368 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.271000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.271000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff3eac3a8 a2=28 a3=fffff3eac4d8 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.271000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.271000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff3eac388 a2=28 a3=fffff3eac4b8 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.271000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.271000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff3eac378 a2=28 a3=fffff3eac4a8 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.271000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.271000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff3eac3a8 a2=28 a3=fffff3eac4d8 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff3eac388 a2=28 a3=fffff3eac4b8 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff3eac3a8 a2=28 a3=fffff3eac4d8 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff3eac378 a2=28 a3=fffff3eac4a8 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff3eac3f8 a2=28 a3=fffff3eac538 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff3eac130 a2=50 a3=0 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit: BPF prog-id=93 op=LOAD
Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff3eac138 a2=94 a3=5 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.272000 audit: BPF prog-id=93 op=UNLOAD
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff3eac240 a2=50 a3=0 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff3eac388 a2=4 a3=3 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { confidentiality } for  pid=2271 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff3eac368 a2=94 a3=6 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { confidentiality } for  pid=2271 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff3eabb38 a2=94 a3=83 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { perfmon } for  pid=2271 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.272000 audit[2271]: AVC avc:  denied  { confidentiality } for  pid=2271 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:56:47.272000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff3eabb38 a2=94 a3=83 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.273000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.273000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff3ead578 a2=10 a3=fffff3ead668 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.273000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.273000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.273000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff3ead438 a2=10 a3=fffff3ead528 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.273000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.273000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.273000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff3ead3a8 a2=10 a3=fffff3ead528 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.273000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.273000 audit[2271]: AVC avc:  denied  { bpf } for  pid=2271 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:47.273000 audit[2271]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff3ead3a8 a2=10 a3=fffff3ead528 items=0 ppid=2115 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.273000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Dec 13 13:56:47.279000 audit: BPF prog-id=88 op=UNLOAD
Dec 13 13:56:47.321000 audit[2292]: NETFILTER_CFG table=mangle:65 family=2 entries=16 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 13:56:47.321000 audit[2292]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffc0aab4b0 a2=0 a3=ffff8c690fa8 items=0 ppid=2115 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.321000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 13:56:47.333000 audit[2295]: NETFILTER_CFG table=filter:66 family=2 entries=39 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 13:56:47.333000 audit[2295]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffe70c9420 a2=0 a3=ffffabad2fa8 items=0 ppid=2115 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.333000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 13:56:47.334000 audit[2294]: NETFILTER_CFG table=nat:67 family=2 entries=15 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 13:56:47.334000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffcccadd20 a2=0 a3=ffffab49bfa8 items=0 ppid=2115 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.334000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 13:56:47.335000 audit[2291]: NETFILTER_CFG table=raw:68 family=2 entries=21 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 13:56:47.335000 audit[2291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffc73d6c60 a2=0 a3=ffffb0794fa8 items=0 ppid=2115 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:47.335000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 13:56:47.367949 systemd[1]: run-containerd-runc-k8s.io-7a99bcb3b278dd21d8ea85fb0123d3747d33f8b3901aa27601da60e0af7f49e1-runc.HyWdNt.mount: Deactivated successfully.
Dec 13 13:56:47.614738 kubelet[1452]: E1213 13:56:47.614622    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:47.812107 kubelet[1452]: E1213 13:56:47.812067    1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 13:56:48.172000 audit[2373]: NETFILTER_CFG table=filter:69 family=2 entries=13 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:56:48.172000 audit[2373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff9b2cd10 a2=0 a3=1 items=0 ppid=1607 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:48.172000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:56:48.182000 audit[2373]: NETFILTER_CFG table=nat:70 family=2 entries=35 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:56:48.182000 audit[2373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=fffff9b2cd10 a2=0 a3=1 items=0 ppid=1607 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:48.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:56:48.510486 systemd-networkd[1035]: vxlan.calico: Gained IPv6LL
Dec 13 13:56:48.615449 kubelet[1452]: E1213 13:56:48.615413    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:49.616378 kubelet[1452]: E1213 13:56:49.616341    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:50.182000 audit[2379]: NETFILTER_CFG table=filter:71 family=2 entries=10 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:56:50.182000 audit[2379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd7a95d70 a2=0 a3=1 items=0 ppid=1607 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:50.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:56:50.193000 audit[2379]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:56:50.193000 audit[2379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd7a95d70 a2=0 a3=1 items=0 ppid=1607 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:50.193000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:56:50.209000 audit[2381]: NETFILTER_CFG table=filter:73 family=2 entries=10 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:56:50.209000 audit[2381]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc8acd210 a2=0 a3=1 items=0 ppid=1607 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:50.209000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:56:50.220000 audit[2381]: NETFILTER_CFG table=nat:74 family=2 entries=44 op=nft_register_rule pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:56:50.220000 audit[2381]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffc8acd210 a2=0 a3=1 items=0 ppid=1607 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:50.220000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:56:50.605081 kubelet[1452]: E1213 13:56:50.604593    1452 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:50.616949 kubelet[1452]: E1213 13:56:50.616907    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:51.182000 audit[2383]: NETFILTER_CFG table=filter:75 family=2 entries=10 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:56:51.185734 kernel: kauditd_printk_skb: 572 callbacks suppressed
Dec 13 13:56:51.185786 kernel: audit: type=1325 audit(1734098211.182:633): table=filter:75 family=2 entries=10 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:56:51.182000 audit[2383]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffd22d280 a2=0 a3=1 items=0 ppid=1607 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:51.189893 kernel: audit: type=1300 audit(1734098211.182:633): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffd22d280 a2=0 a3=1 items=0 ppid=1607 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:51.189972 kernel: audit: type=1327 audit(1734098211.182:633): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:56:51.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:56:51.191000 audit[2383]: NETFILTER_CFG table=nat:76 family=2 entries=20 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:56:51.191000 audit[2383]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffd22d280 a2=0 a3=1 items=0 ppid=1607 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:51.197003 kernel: audit: type=1325 audit(1734098211.191:634): table=nat:76 family=2 entries=20 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:56:51.197066 kernel: audit: type=1300 audit(1734098211.191:634): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffffd22d280 a2=0 a3=1 items=0 ppid=1607 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:51.197092 kernel: audit: type=1327 audit(1734098211.191:634): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:56:51.191000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:56:51.618004 kubelet[1452]: E1213 13:56:51.617837    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:52.212000 audit[2385]: NETFILTER_CFG table=filter:77 family=2 entries=9 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:56:52.212000 audit[2385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc05b8230 a2=0 a3=1 items=0 ppid=1607 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:52.218118 kernel: audit: type=1325 audit(1734098212.212:635): table=filter:77 family=2 entries=9 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:56:52.218262 kernel: audit: type=1300 audit(1734098212.212:635): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc05b8230 a2=0 a3=1 items=0 ppid=1607 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:52.218297 kernel: audit: type=1327 audit(1734098212.212:635): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:56:52.212000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:56:52.229000 audit[2385]: NETFILTER_CFG table=nat:78 family=2 entries=63 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:56:52.229000 audit[2385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23436 a0=3 a1=ffffc05b8230 a2=0 a3=1 items=0 ppid=1607 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:52.229000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:56:52.234297 kernel: audit: type=1325 audit(1734098212.229:636): table=nat:78 family=2 entries=63 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:56:52.618907 kubelet[1452]: E1213 13:56:52.618801    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:53.250000 audit[2397]: NETFILTER_CFG table=filter:79 family=2 entries=8 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:56:53.250000 audit[2397]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc34ef9a0 a2=0 a3=1 items=0 ppid=1607 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:53.250000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:56:53.256000 audit[2397]: NETFILTER_CFG table=nat:80 family=2 entries=34 op=nft_register_chain pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:56:53.256000 audit[2397]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffc34ef9a0 a2=0 a3=1 items=0 ppid=1607 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:53.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:56:53.620557 kubelet[1452]: E1213 13:56:53.620406    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:53.772276 env[1206]: time="2024-12-13T13:56:53.772205054Z" level=info msg="StopPodSandbox for \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\""
Dec 13 13:56:53.819958 kubelet[1452]: I1213 13:56:53.819892    1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-wqwlk" podStartSLOduration=12.052500738 podStartE2EDuration="23.81987246s" podCreationTimestamp="2024-12-13 13:56:30 +0000 UTC" firstStartedPulling="2024-12-13 13:56:33.600270209 +0000 UTC m=+3.751656455" lastFinishedPulling="2024-12-13 13:56:45.367641931 +0000 UTC m=+15.519028177" observedRunningTime="2024-12-13 13:56:45.828484352 +0000 UTC m=+15.979870598" watchObservedRunningTime="2024-12-13 13:56:53.81987246 +0000 UTC m=+23.971258706"
Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.819 [INFO][2414] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148"
Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.819 [INFO][2414] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" iface="eth0" netns="/var/run/netns/cni-34a12ba4-c8fc-0bdf-fc00-366615ad385a"
Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.820 [INFO][2414] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" iface="eth0" netns="/var/run/netns/cni-34a12ba4-c8fc-0bdf-fc00-366615ad385a"
Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.820 [INFO][2414] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone.  Nothing to do. ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" iface="eth0" netns="/var/run/netns/cni-34a12ba4-c8fc-0bdf-fc00-366615ad385a"
Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.820 [INFO][2414] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148"
Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.820 [INFO][2414] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148"
Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.873 [INFO][2421] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" HandleID="k8s-pod-network.dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" Workload="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0"
Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.873 [INFO][2421] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.874 [INFO][2421] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.885 [WARNING][2421] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" HandleID="k8s-pod-network.dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" Workload="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0"
Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.885 [INFO][2421] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" HandleID="k8s-pod-network.dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148" Workload="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0"
Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.887 [INFO][2421] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 13:56:53.890930 env[1206]: 2024-12-13 13:56:53.889 [INFO][2414] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148"
Dec 13 13:56:53.891632 env[1206]: time="2024-12-13T13:56:53.891592654Z" level=info msg="TearDown network for sandbox \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\" successfully"
Dec 13 13:56:53.891724 env[1206]: time="2024-12-13T13:56:53.891706714Z" level=info msg="StopPodSandbox for \"dbb5457e87ea8d198b014c6843f4878914a91f3299c6540e24000222d7bf4148\" returns successfully"
Dec 13 13:56:53.892723 env[1206]: time="2024-12-13T13:56:53.892648740Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6tkwm,Uid:8da14905-625a-4f83-a34c-8ea13d6ed11a,Namespace:calico-system,Attempt:1,}"
Dec 13 13:56:53.893085 systemd[1]: run-netns-cni\x2d34a12ba4\x2dc8fc\x2d0bdf\x2dfc00\x2d366615ad385a.mount: Deactivated successfully.
Dec 13 13:56:54.037733 systemd-networkd[1035]: cali4755e8692dd: Link UP
Dec 13 13:56:54.039483 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Dec 13 13:56:54.039516 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4755e8692dd: link becomes ready
Dec 13 13:56:54.039153 systemd-networkd[1035]: cali4755e8692dd: Gained carrier
Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:53.961 [INFO][2428] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.19-k8s-csi--node--driver--6tkwm-eth0 csi-node-driver- calico-system  8da14905-625a-4f83-a34c-8ea13d6ed11a 1053 0 2024-12-13 13:56:30 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s  10.0.0.19  csi-node-driver-6tkwm eth0 csi-node-driver [] []   [kns.calico-system ksa.calico-system.csi-node-driver] cali4755e8692dd  [] []}} ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Namespace="calico-system" Pod="csi-node-driver-6tkwm" WorkloadEndpoint="10.0.0.19-k8s-csi--node--driver--6tkwm-"
Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:53.961 [INFO][2428] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Namespace="calico-system" Pod="csi-node-driver-6tkwm" WorkloadEndpoint="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0"
Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:53.988 [INFO][2441] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" HandleID="k8s-pod-network.d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Workload="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0"
Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.001 [INFO][2441] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" HandleID="k8s-pod-network.d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Workload="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d8d90), Attrs:map[string]string{"namespace":"calico-system", "node":"10.0.0.19", "pod":"csi-node-driver-6tkwm", "timestamp":"2024-12-13 13:56:53.988069108 +0000 UTC"}, Hostname:"10.0.0.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.001 [INFO][2441] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.001 [INFO][2441] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.001 [INFO][2441] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.19'
Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.005 [INFO][2441] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" host="10.0.0.19"
Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.010 [INFO][2441] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.19"
Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.016 [INFO][2441] ipam/ipam.go 489: Trying affinity for 192.168.37.0/26 host="10.0.0.19"
Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.018 [INFO][2441] ipam/ipam.go 155: Attempting to load block cidr=192.168.37.0/26 host="10.0.0.19"
Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.021 [INFO][2441] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.37.0/26 host="10.0.0.19"
Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.021 [INFO][2441] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.37.0/26 handle="k8s-pod-network.d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" host="10.0.0.19"
Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.023 [INFO][2441] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c
Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.027 [INFO][2441] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.37.0/26 handle="k8s-pod-network.d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" host="10.0.0.19"
Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.032 [INFO][2441] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.37.1/26] block=192.168.37.0/26 handle="k8s-pod-network.d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" host="10.0.0.19"
Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.032 [INFO][2441] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.37.1/26] handle="k8s-pod-network.d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" host="10.0.0.19"
Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.032 [INFO][2441] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 13:56:54.050556 env[1206]: 2024-12-13 13:56:54.032 [INFO][2441] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.37.1/26] IPv6=[] ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" HandleID="k8s-pod-network.d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Workload="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0"
Dec 13 13:56:54.051068 env[1206]: 2024-12-13 13:56:54.035 [INFO][2428] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Namespace="calico-system" Pod="csi-node-driver-6tkwm" WorkloadEndpoint="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.19-k8s-csi--node--driver--6tkwm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8da14905-625a-4f83-a34c-8ea13d6ed11a", ResourceVersion:"1053", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 56, 30, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.19", ContainerID:"", Pod:"csi-node-driver-6tkwm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.37.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4755e8692dd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 13:56:54.051068 env[1206]: 2024-12-13 13:56:54.035 [INFO][2428] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.37.1/32] ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Namespace="calico-system" Pod="csi-node-driver-6tkwm" WorkloadEndpoint="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0"
Dec 13 13:56:54.051068 env[1206]: 2024-12-13 13:56:54.035 [INFO][2428] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4755e8692dd ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Namespace="calico-system" Pod="csi-node-driver-6tkwm" WorkloadEndpoint="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0"
Dec 13 13:56:54.051068 env[1206]: 2024-12-13 13:56:54.039 [INFO][2428] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Namespace="calico-system" Pod="csi-node-driver-6tkwm" WorkloadEndpoint="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0"
Dec 13 13:56:54.051068 env[1206]: 2024-12-13 13:56:54.040 [INFO][2428] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Namespace="calico-system" Pod="csi-node-driver-6tkwm" WorkloadEndpoint="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.19-k8s-csi--node--driver--6tkwm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8da14905-625a-4f83-a34c-8ea13d6ed11a", ResourceVersion:"1053", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 56, 30, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.19", ContainerID:"d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c", Pod:"csi-node-driver-6tkwm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.37.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali4755e8692dd", MAC:"7a:da:b0:4f:97:09", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 13:56:54.051068 env[1206]: 2024-12-13 13:56:54.048 [INFO][2428] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c" Namespace="calico-system" Pod="csi-node-driver-6tkwm" WorkloadEndpoint="10.0.0.19-k8s-csi--node--driver--6tkwm-eth0"
Dec 13 13:56:54.058000 audit[2468]: NETFILTER_CFG table=filter:81 family=2 entries=34 op=nft_register_chain pid=2468 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 13:56:54.058000 audit[2468]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffd1c616f0 a2=0 a3=ffff9bcd5fa8 items=0 ppid=2115 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:54.058000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 13:56:54.062057 env[1206]: time="2024-12-13T13:56:54.061994526Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 13:56:54.062057 env[1206]: time="2024-12-13T13:56:54.062036347Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 13:56:54.062057 env[1206]: time="2024-12-13T13:56:54.062046742Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 13:56:54.062204 env[1206]: time="2024-12-13T13:56:54.062173764Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c pid=2472 runtime=io.containerd.runc.v2
Dec 13 13:56:54.075177 systemd[1]: Started cri-containerd-d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c.scope.
Dec 13 13:56:54.088000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit: BPF prog-id=94 op=LOAD
Dec 13 13:56:54.088000 audit[2481]: AVC avc:  denied  { bpf } for  pid=2481 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[2481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2472 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:54.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432623539646133623062653061393563663937613361353665323239
Dec 13 13:56:54.088000 audit[2481]: AVC avc:  denied  { perfmon } for  pid=2481 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[2481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2472 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:54.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432623539646133623062653061393563663937613361353665323239
Dec 13 13:56:54.088000 audit[2481]: AVC avc:  denied  { bpf } for  pid=2481 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[2481]: AVC avc:  denied  { bpf } for  pid=2481 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[2481]: AVC avc:  denied  { bpf } for  pid=2481 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[2481]: AVC avc:  denied  { perfmon } for  pid=2481 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[2481]: AVC avc:  denied  { perfmon } for  pid=2481 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[2481]: AVC avc:  denied  { perfmon } for  pid=2481 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[2481]: AVC avc:  denied  { perfmon } for  pid=2481 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[2481]: AVC avc:  denied  { perfmon } for  pid=2481 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[2481]: AVC avc:  denied  { bpf } for  pid=2481 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit[2481]: AVC avc:  denied  { bpf } for  pid=2481 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.088000 audit: BPF prog-id=95 op=LOAD
Dec 13 13:56:54.088000 audit[2481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2472 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:54.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432623539646133623062653061393563663937613361353665323239
Dec 13 13:56:54.089000 audit[2481]: AVC avc:  denied  { bpf } for  pid=2481 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.089000 audit[2481]: AVC avc:  denied  { bpf } for  pid=2481 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.089000 audit[2481]: AVC avc:  denied  { perfmon } for  pid=2481 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.089000 audit[2481]: AVC avc:  denied  { perfmon } for  pid=2481 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.089000 audit[2481]: AVC avc:  denied  { perfmon } for  pid=2481 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.089000 audit[2481]: AVC avc:  denied  { perfmon } for  pid=2481 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.089000 audit[2481]: AVC avc:  denied  { perfmon } for  pid=2481 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.089000 audit[2481]: AVC avc:  denied  { bpf } for  pid=2481 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.089000 audit[2481]: AVC avc:  denied  { bpf } for  pid=2481 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.089000 audit: BPF prog-id=96 op=LOAD
Dec 13 13:56:54.089000 audit[2481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2472 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:54.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432623539646133623062653061393563663937613361353665323239
Dec 13 13:56:54.089000 audit: BPF prog-id=96 op=UNLOAD
Dec 13 13:56:54.089000 audit: BPF prog-id=95 op=UNLOAD
Dec 13 13:56:54.089000 audit[2481]: AVC avc:  denied  { bpf } for  pid=2481 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.089000 audit[2481]: AVC avc:  denied  { bpf } for  pid=2481 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.089000 audit[2481]: AVC avc:  denied  { bpf } for  pid=2481 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.089000 audit[2481]: AVC avc:  denied  { perfmon } for  pid=2481 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.089000 audit[2481]: AVC avc:  denied  { perfmon } for  pid=2481 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.089000 audit[2481]: AVC avc:  denied  { perfmon } for  pid=2481 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.089000 audit[2481]: AVC avc:  denied  { perfmon } for  pid=2481 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.089000 audit[2481]: AVC avc:  denied  { perfmon } for  pid=2481 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.089000 audit[2481]: AVC avc:  denied  { bpf } for  pid=2481 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.089000 audit[2481]: AVC avc:  denied  { bpf } for  pid=2481 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:54.089000 audit: BPF prog-id=97 op=LOAD
Dec 13 13:56:54.089000 audit[2481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2472 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:54.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432623539646133623062653061393563663937613361353665323239
Dec 13 13:56:54.091902 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address
Dec 13 13:56:54.101865 env[1206]: time="2024-12-13T13:56:54.101827652Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6tkwm,Uid:8da14905-625a-4f83-a34c-8ea13d6ed11a,Namespace:calico-system,Attempt:1,} returns sandbox id \"d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c\""
Dec 13 13:56:54.103386 env[1206]: time="2024-12-13T13:56:54.103357510Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\""
Dec 13 13:56:54.621219 kubelet[1452]: E1213 13:56:54.621164    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:55.029097 env[1206]: time="2024-12-13T13:56:55.028981928Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:55.030496 env[1206]: time="2024-12-13T13:56:55.030467143Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:55.032294 env[1206]: time="2024-12-13T13:56:55.032266769Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:55.033713 env[1206]: time="2024-12-13T13:56:55.033671780Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:55.034106 env[1206]: time="2024-12-13T13:56:55.034072795Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163\""
Dec 13 13:56:55.038457 env[1206]: time="2024-12-13T13:56:55.038413114Z" level=info msg="CreateContainer within sandbox \"d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}"
Dec 13 13:56:55.060014 env[1206]: time="2024-12-13T13:56:55.059945224Z" level=info msg="CreateContainer within sandbox \"d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"3cbe490d6f071b8e75e57d05ce5eb0d0aeb7f2b4ce5caa141d376a7ca370d09f\""
Dec 13 13:56:55.061189 env[1206]: time="2024-12-13T13:56:55.061161268Z" level=info msg="StartContainer for \"3cbe490d6f071b8e75e57d05ce5eb0d0aeb7f2b4ce5caa141d376a7ca370d09f\""
Dec 13 13:56:55.080948 systemd[1]: Started cri-containerd-3cbe490d6f071b8e75e57d05ce5eb0d0aeb7f2b4ce5caa141d376a7ca370d09f.scope.
Dec 13 13:56:55.101000 audit[2513]: AVC avc:  denied  { perfmon } for  pid=2513 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.101000 audit[2513]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2472 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:55.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363626534393064366630373162386537356535376430356365356562
Dec 13 13:56:55.101000 audit[2513]: AVC avc:  denied  { bpf } for  pid=2513 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.101000 audit[2513]: AVC avc:  denied  { bpf } for  pid=2513 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.101000 audit[2513]: AVC avc:  denied  { bpf } for  pid=2513 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.101000 audit[2513]: AVC avc:  denied  { perfmon } for  pid=2513 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.101000 audit[2513]: AVC avc:  denied  { perfmon } for  pid=2513 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.101000 audit[2513]: AVC avc:  denied  { perfmon } for  pid=2513 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.101000 audit[2513]: AVC avc:  denied  { perfmon } for  pid=2513 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.101000 audit[2513]: AVC avc:  denied  { perfmon } for  pid=2513 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.101000 audit[2513]: AVC avc:  denied  { bpf } for  pid=2513 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.101000 audit[2513]: AVC avc:  denied  { bpf } for  pid=2513 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.101000 audit: BPF prog-id=98 op=LOAD
Dec 13 13:56:55.101000 audit[2513]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2472 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:55.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363626534393064366630373162386537356535376430356365356562
Dec 13 13:56:55.102000 audit[2513]: AVC avc:  denied  { bpf } for  pid=2513 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.102000 audit[2513]: AVC avc:  denied  { bpf } for  pid=2513 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.102000 audit[2513]: AVC avc:  denied  { perfmon } for  pid=2513 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.102000 audit[2513]: AVC avc:  denied  { perfmon } for  pid=2513 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.102000 audit[2513]: AVC avc:  denied  { perfmon } for  pid=2513 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.102000 audit[2513]: AVC avc:  denied  { perfmon } for  pid=2513 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.102000 audit[2513]: AVC avc:  denied  { perfmon } for  pid=2513 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.102000 audit[2513]: AVC avc:  denied  { bpf } for  pid=2513 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.102000 audit[2513]: AVC avc:  denied  { bpf } for  pid=2513 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.102000 audit: BPF prog-id=99 op=LOAD
Dec 13 13:56:55.102000 audit[2513]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2472 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:55.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363626534393064366630373162386537356535376430356365356562
Dec 13 13:56:55.102000 audit: BPF prog-id=99 op=UNLOAD
Dec 13 13:56:55.102000 audit: BPF prog-id=98 op=UNLOAD
Dec 13 13:56:55.102000 audit[2513]: AVC avc:  denied  { bpf } for  pid=2513 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.102000 audit[2513]: AVC avc:  denied  { bpf } for  pid=2513 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.102000 audit[2513]: AVC avc:  denied  { bpf } for  pid=2513 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.102000 audit[2513]: AVC avc:  denied  { perfmon } for  pid=2513 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.102000 audit[2513]: AVC avc:  denied  { perfmon } for  pid=2513 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.102000 audit[2513]: AVC avc:  denied  { perfmon } for  pid=2513 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.102000 audit[2513]: AVC avc:  denied  { perfmon } for  pid=2513 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.102000 audit[2513]: AVC avc:  denied  { perfmon } for  pid=2513 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.102000 audit[2513]: AVC avc:  denied  { bpf } for  pid=2513 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.102000 audit[2513]: AVC avc:  denied  { bpf } for  pid=2513 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:55.102000 audit: BPF prog-id=100 op=LOAD
Dec 13 13:56:55.102000 audit[2513]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2472 pid=2513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:55.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363626534393064366630373162386537356535376430356365356562
Dec 13 13:56:55.171021 env[1206]: time="2024-12-13T13:56:55.170937215Z" level=info msg="StartContainer for \"3cbe490d6f071b8e75e57d05ce5eb0d0aeb7f2b4ce5caa141d376a7ca370d09f\" returns successfully"
Dec 13 13:56:55.172452 env[1206]: time="2024-12-13T13:56:55.172417509Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\""
Dec 13 13:56:55.486463 systemd-networkd[1035]: cali4755e8692dd: Gained IPv6LL
Dec 13 13:56:55.621772 kubelet[1452]: E1213 13:56:55.621727    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:55.772135 env[1206]: time="2024-12-13T13:56:55.771977020Z" level=info msg="StopPodSandbox for \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\""
Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.812 [INFO][2556] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31"
Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.812 [INFO][2556] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" iface="eth0" netns="/var/run/netns/cni-4cedbaec-2560-e9ef-a77b-e9d873ef4e7f"
Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.812 [INFO][2556] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" iface="eth0" netns="/var/run/netns/cni-4cedbaec-2560-e9ef-a77b-e9d873ef4e7f"
Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.813 [INFO][2556] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone.  Nothing to do. ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" iface="eth0" netns="/var/run/netns/cni-4cedbaec-2560-e9ef-a77b-e9d873ef4e7f"
Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.813 [INFO][2556] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31"
Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.813 [INFO][2556] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31"
Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.833 [INFO][2564] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" HandleID="k8s-pod-network.fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" Workload="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0"
Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.833 [INFO][2564] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.833 [INFO][2564] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.842 [WARNING][2564] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" HandleID="k8s-pod-network.fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" Workload="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0"
Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.842 [INFO][2564] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" HandleID="k8s-pod-network.fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31" Workload="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0"
Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.844 [INFO][2564] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 13:56:55.848955 env[1206]: 2024-12-13 13:56:55.846 [INFO][2556] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31"
Dec 13 13:56:55.849355 env[1206]: time="2024-12-13T13:56:55.849117129Z" level=info msg="TearDown network for sandbox \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\" successfully"
Dec 13 13:56:55.849355 env[1206]: time="2024-12-13T13:56:55.849144130Z" level=info msg="StopPodSandbox for \"fb208efd4cf89a81549b7e39fafe4dd565adfbbc26ecfa74401267f8f846bd31\" returns successfully"
Dec 13 13:56:55.849759 env[1206]: time="2024-12-13T13:56:55.849689630Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-f45xp,Uid:1646a1a4-8cfe-4cb8-8267-3eda01835546,Namespace:default,Attempt:1,}"
Dec 13 13:56:55.850861 systemd[1]: run-netns-cni\x2d4cedbaec\x2d2560\x2de9ef\x2da77b\x2de9d873ef4e7f.mount: Deactivated successfully.
Dec 13 13:56:55.951625 systemd-networkd[1035]: cali39b4e38866b: Link UP
Dec 13 13:56:55.953374 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Dec 13 13:56:55.953652 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali39b4e38866b: link becomes ready
Dec 13 13:56:55.953520 systemd-networkd[1035]: cali39b4e38866b: Gained carrier
Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.887 [INFO][2571] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0 nginx-deployment-85f456d6dd- default  1646a1a4-8cfe-4cb8-8267-3eda01835546 1065 0 2024-12-13 13:56:41 +0000 UTC <nil> <nil> map[app:nginx pod-template-hash:85f456d6dd projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s  10.0.0.19  nginx-deployment-85f456d6dd-f45xp eth0 default [] []   [kns.default ksa.default.default] cali39b4e38866b  [] []}} ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Namespace="default" Pod="nginx-deployment-85f456d6dd-f45xp" WorkloadEndpoint="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-"
Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.888 [INFO][2571] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Namespace="default" Pod="nginx-deployment-85f456d6dd-f45xp" WorkloadEndpoint="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0"
Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.911 [INFO][2584] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" HandleID="k8s-pod-network.b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Workload="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0"
Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.923 [INFO][2584] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" HandleID="k8s-pod-network.b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Workload="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000305c80), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.19", "pod":"nginx-deployment-85f456d6dd-f45xp", "timestamp":"2024-12-13 13:56:55.911963034 +0000 UTC"}, Hostname:"10.0.0.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.923 [INFO][2584] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.923 [INFO][2584] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.923 [INFO][2584] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.19'
Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.924 [INFO][2584] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" host="10.0.0.19"
Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.928 [INFO][2584] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.19"
Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.932 [INFO][2584] ipam/ipam.go 489: Trying affinity for 192.168.37.0/26 host="10.0.0.19"
Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.934 [INFO][2584] ipam/ipam.go 155: Attempting to load block cidr=192.168.37.0/26 host="10.0.0.19"
Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.936 [INFO][2584] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.37.0/26 host="10.0.0.19"
Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.936 [INFO][2584] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.37.0/26 handle="k8s-pod-network.b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" host="10.0.0.19"
Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.937 [INFO][2584] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa
Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.941 [INFO][2584] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.37.0/26 handle="k8s-pod-network.b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" host="10.0.0.19"
Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.945 [INFO][2584] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.37.2/26] block=192.168.37.0/26 handle="k8s-pod-network.b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" host="10.0.0.19"
Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.946 [INFO][2584] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.37.2/26] handle="k8s-pod-network.b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" host="10.0.0.19"
Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.946 [INFO][2584] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 13:56:55.963864 env[1206]: 2024-12-13 13:56:55.946 [INFO][2584] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.37.2/26] IPv6=[] ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" HandleID="k8s-pod-network.b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Workload="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0"
Dec 13 13:56:55.964514 env[1206]: 2024-12-13 13:56:55.947 [INFO][2571] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Namespace="default" Pod="nginx-deployment-85f456d6dd-f45xp" WorkloadEndpoint="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"1646a1a4-8cfe-4cb8-8267-3eda01835546", ResourceVersion:"1065", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 56, 41, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.19", ContainerID:"", Pod:"nginx-deployment-85f456d6dd-f45xp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali39b4e38866b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 13:56:55.964514 env[1206]: 2024-12-13 13:56:55.947 [INFO][2571] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.37.2/32] ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Namespace="default" Pod="nginx-deployment-85f456d6dd-f45xp" WorkloadEndpoint="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0"
Dec 13 13:56:55.964514 env[1206]: 2024-12-13 13:56:55.947 [INFO][2571] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali39b4e38866b ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Namespace="default" Pod="nginx-deployment-85f456d6dd-f45xp" WorkloadEndpoint="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0"
Dec 13 13:56:55.964514 env[1206]: 2024-12-13 13:56:55.953 [INFO][2571] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Namespace="default" Pod="nginx-deployment-85f456d6dd-f45xp" WorkloadEndpoint="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0"
Dec 13 13:56:55.964514 env[1206]: 2024-12-13 13:56:55.954 [INFO][2571] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Namespace="default" Pod="nginx-deployment-85f456d6dd-f45xp" WorkloadEndpoint="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0", GenerateName:"nginx-deployment-85f456d6dd-", Namespace:"default", SelfLink:"", UID:"1646a1a4-8cfe-4cb8-8267-3eda01835546", ResourceVersion:"1065", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 56, 41, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"85f456d6dd", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.19", ContainerID:"b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa", Pod:"nginx-deployment-85f456d6dd-f45xp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali39b4e38866b", MAC:"72:e9:61:19:d1:db", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 13:56:55.964514 env[1206]: 2024-12-13 13:56:55.961 [INFO][2571] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa" Namespace="default" Pod="nginx-deployment-85f456d6dd-f45xp" WorkloadEndpoint="10.0.0.19-k8s-nginx--deployment--85f456d6dd--f45xp-eth0"
Dec 13 13:56:55.970000 audit[2606]: NETFILTER_CFG table=filter:82 family=2 entries=38 op=nft_register_chain pid=2606 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 13:56:55.970000 audit[2606]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20312 a0=3 a1=ffffd8f1bc60 a2=0 a3=ffffbe538fa8 items=0 ppid=2115 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:55.970000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 13:56:55.976512 env[1206]: time="2024-12-13T13:56:55.976441879Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 13:56:55.976512 env[1206]: time="2024-12-13T13:56:55.976481840Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 13:56:55.976512 env[1206]: time="2024-12-13T13:56:55.976492241Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 13:56:55.977304 env[1206]: time="2024-12-13T13:56:55.977233268Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa pid=2614 runtime=io.containerd.runc.v2
Dec 13 13:56:55.986820 systemd[1]: Started cri-containerd-b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa.scope.
Dec 13 13:56:56.011000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit: BPF prog-id=101 op=LOAD
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2614 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:56.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235383363313761336530616261363834303237316164396265313631
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2614 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:56.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235383363313761336530616261363834303237316164396265313631
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit: BPF prog-id=102 op=LOAD
Dec 13 13:56:56.011000 audit[2624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2614 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:56.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235383363313761336530616261363834303237316164396265313631
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit: BPF prog-id=103 op=LOAD
Dec 13 13:56:56.011000 audit[2624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2614 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:56.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235383363313761336530616261363834303237316164396265313631
Dec 13 13:56:56.011000 audit: BPF prog-id=103 op=UNLOAD
Dec 13 13:56:56.011000 audit: BPF prog-id=102 op=UNLOAD
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { perfmon } for  pid=2624 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit[2624]: AVC avc:  denied  { bpf } for  pid=2624 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.011000 audit: BPF prog-id=104 op=LOAD
Dec 13 13:56:56.011000 audit[2624]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2614 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:56.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235383363313761336530616261363834303237316164396265313631
Dec 13 13:56:56.013328 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address
Dec 13 13:56:56.029829 env[1206]: time="2024-12-13T13:56:56.029723895Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-85f456d6dd-f45xp,Uid:1646a1a4-8cfe-4cb8-8267-3eda01835546,Namespace:default,Attempt:1,} returns sandbox id \"b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa\""
Dec 13 13:56:56.276438 env[1206]: time="2024-12-13T13:56:56.276206153Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:56.279327 env[1206]: time="2024-12-13T13:56:56.279288500Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:56.280930 env[1206]: time="2024-12-13T13:56:56.280864235Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:56.282350 env[1206]: time="2024-12-13T13:56:56.282320165Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:56.282728 env[1206]: time="2024-12-13T13:56:56.282704378Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349\""
Dec 13 13:56:56.284489 env[1206]: time="2024-12-13T13:56:56.284466320Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\""
Dec 13 13:56:56.285295 env[1206]: time="2024-12-13T13:56:56.285268387Z" level=info msg="CreateContainer within sandbox \"d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}"
Dec 13 13:56:56.296277 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3714477386.mount: Deactivated successfully.
Dec 13 13:56:56.300810 env[1206]: time="2024-12-13T13:56:56.300775524Z" level=info msg="CreateContainer within sandbox \"d2b59da3b0be0a95cf97a3a56e2290beb1de89c2888074b979db845d575a9d6c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"4fc26163d4d4c3e06ebd1699b41d683a66d2e481df7c4948b8819a001667baf5\""
Dec 13 13:56:56.301617 env[1206]: time="2024-12-13T13:56:56.301592753Z" level=info msg="StartContainer for \"4fc26163d4d4c3e06ebd1699b41d683a66d2e481df7c4948b8819a001667baf5\""
Dec 13 13:56:56.319995 systemd[1]: Started cri-containerd-4fc26163d4d4c3e06ebd1699b41d683a66d2e481df7c4948b8819a001667baf5.scope.
Dec 13 13:56:56.364000 audit[2655]: AVC avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.366467 kernel: kauditd_printk_skb: 171 callbacks suppressed
Dec 13 13:56:56.366508 kernel: audit: type=1400 audit(1734098216.364:683): avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.368297 kernel: audit: type=1300 audit(1734098216.364:683): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2472 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:56.364000 audit[2655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2472 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:56.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633236313633643464346333653036656264313639396234316436
Dec 13 13:56:56.373327 kernel: audit: type=1327 audit(1734098216.364:683): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633236313633643464346333653036656264313639396234316436
Dec 13 13:56:56.373401 kernel: audit: type=1400 audit(1734098216.365:684): avc:  denied  { bpf } for  pid=2655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit[2655]: AVC avc:  denied  { bpf } for  pid=2655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.376244 kernel: audit: type=1400 audit(1734098216.365:684): avc:  denied  { bpf } for  pid=2655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit[2655]: AVC avc:  denied  { bpf } for  pid=2655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.378464 kernel: audit: type=1400 audit(1734098216.365:684): avc:  denied  { bpf } for  pid=2655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit[2655]: AVC avc:  denied  { bpf } for  pid=2655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit[2655]: AVC avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.381262 kernel: audit: type=1400 audit(1734098216.365:684): avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.381324 kernel: audit: type=1400 audit(1734098216.365:684): avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit[2655]: AVC avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit[2655]: AVC avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.387346 kernel: audit: type=1400 audit(1734098216.365:684): avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.387450 kernel: audit: type=1400 audit(1734098216.365:684): avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit[2655]: AVC avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit[2655]: AVC avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit[2655]: AVC avc:  denied  { bpf } for  pid=2655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit[2655]: AVC avc:  denied  { bpf } for  pid=2655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit: BPF prog-id=105 op=LOAD
Dec 13 13:56:56.365000 audit[2655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2472 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:56.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633236313633643464346333653036656264313639396234316436
Dec 13 13:56:56.365000 audit[2655]: AVC avc:  denied  { bpf } for  pid=2655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit[2655]: AVC avc:  denied  { bpf } for  pid=2655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit[2655]: AVC avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit[2655]: AVC avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit[2655]: AVC avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit[2655]: AVC avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit[2655]: AVC avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit[2655]: AVC avc:  denied  { bpf } for  pid=2655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit[2655]: AVC avc:  denied  { bpf } for  pid=2655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.365000 audit: BPF prog-id=106 op=LOAD
Dec 13 13:56:56.365000 audit[2655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2472 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:56.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633236313633643464346333653036656264313639396234316436
Dec 13 13:56:56.367000 audit: BPF prog-id=106 op=UNLOAD
Dec 13 13:56:56.367000 audit: BPF prog-id=105 op=UNLOAD
Dec 13 13:56:56.367000 audit[2655]: AVC avc:  denied  { bpf } for  pid=2655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.367000 audit[2655]: AVC avc:  denied  { bpf } for  pid=2655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.367000 audit[2655]: AVC avc:  denied  { bpf } for  pid=2655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.367000 audit[2655]: AVC avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.367000 audit[2655]: AVC avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.367000 audit[2655]: AVC avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.367000 audit[2655]: AVC avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.367000 audit[2655]: AVC avc:  denied  { perfmon } for  pid=2655 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.367000 audit[2655]: AVC avc:  denied  { bpf } for  pid=2655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.367000 audit[2655]: AVC avc:  denied  { bpf } for  pid=2655 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:56.367000 audit: BPF prog-id=107 op=LOAD
Dec 13 13:56:56.367000 audit[2655]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2472 pid=2655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:56.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466633236313633643464346333653036656264313639396234316436
Dec 13 13:56:56.392076 env[1206]: time="2024-12-13T13:56:56.392029726Z" level=info msg="StartContainer for \"4fc26163d4d4c3e06ebd1699b41d683a66d2e481df7c4948b8819a001667baf5\" returns successfully"
Dec 13 13:56:56.622491 kubelet[1452]: E1213 13:56:56.622395    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:56.743289 kubelet[1452]: I1213 13:56:56.743205    1452 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0
Dec 13 13:56:56.743289 kubelet[1452]: I1213 13:56:56.743261    1452 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock
Dec 13 13:56:57.406558 systemd-networkd[1035]: cali39b4e38866b: Gained IPv6LL
Dec 13 13:56:57.622724 kubelet[1452]: E1213 13:56:57.622662    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:58.408978 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1889477731.mount: Deactivated successfully.
Dec 13 13:56:58.623026 kubelet[1452]: E1213 13:56:58.622958    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:59.583464 env[1206]: time="2024-12-13T13:56:59.583410304Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:59.584724 env[1206]: time="2024-12-13T13:56:59.584691541Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:59.586425 env[1206]: time="2024-12-13T13:56:59.586396991Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:59.588183 env[1206]: time="2024-12-13T13:56:59.588159523Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:56:59.588932 env[1206]: time="2024-12-13T13:56:59.588906504Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de\""
Dec 13 13:56:59.591269 env[1206]: time="2024-12-13T13:56:59.591225132Z" level=info msg="CreateContainer within sandbox \"b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa\" for container &ContainerMetadata{Name:nginx,Attempt:0,}"
Dec 13 13:56:59.600454 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2794459789.mount: Deactivated successfully.
Dec 13 13:56:59.603156 env[1206]: time="2024-12-13T13:56:59.603107840Z" level=info msg="CreateContainer within sandbox \"b583c17a3e0aba6840271ad9be1619db270061e9ed703ac102a5d9f8a25a7efa\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"5e6dff8b12d068a380cb2af2b9fbad64eb650088df53ee49be16f82179caa8df\""
Dec 13 13:56:59.603860 env[1206]: time="2024-12-13T13:56:59.603828941Z" level=info msg="StartContainer for \"5e6dff8b12d068a380cb2af2b9fbad64eb650088df53ee49be16f82179caa8df\""
Dec 13 13:56:59.622102 systemd[1]: Started cri-containerd-5e6dff8b12d068a380cb2af2b9fbad64eb650088df53ee49be16f82179caa8df.scope.
Dec 13 13:56:59.626143 kubelet[1452]: E1213 13:56:59.623809    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:56:59.664000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.664000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.664000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.664000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.664000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.664000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.664000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.664000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.664000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit: BPF prog-id=108 op=LOAD
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { bpf } for  pid=2701 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2614 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:59.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366466663862313264303638613338306362326166326239666261
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { perfmon } for  pid=2701 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2614 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:59.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366466663862313264303638613338306362326166326239666261
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { bpf } for  pid=2701 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { bpf } for  pid=2701 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { bpf } for  pid=2701 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { perfmon } for  pid=2701 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { perfmon } for  pid=2701 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { perfmon } for  pid=2701 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { perfmon } for  pid=2701 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { perfmon } for  pid=2701 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { bpf } for  pid=2701 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { bpf } for  pid=2701 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit: BPF prog-id=109 op=LOAD
Dec 13 13:56:59.665000 audit[2701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2614 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:59.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366466663862313264303638613338306362326166326239666261
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { bpf } for  pid=2701 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { bpf } for  pid=2701 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { perfmon } for  pid=2701 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { perfmon } for  pid=2701 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { perfmon } for  pid=2701 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { perfmon } for  pid=2701 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { perfmon } for  pid=2701 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { bpf } for  pid=2701 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { bpf } for  pid=2701 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit: BPF prog-id=110 op=LOAD
Dec 13 13:56:59.665000 audit[2701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2614 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:59.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366466663862313264303638613338306362326166326239666261
Dec 13 13:56:59.665000 audit: BPF prog-id=110 op=UNLOAD
Dec 13 13:56:59.665000 audit: BPF prog-id=109 op=UNLOAD
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { bpf } for  pid=2701 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { bpf } for  pid=2701 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { bpf } for  pid=2701 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { perfmon } for  pid=2701 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { perfmon } for  pid=2701 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { perfmon } for  pid=2701 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { perfmon } for  pid=2701 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { perfmon } for  pid=2701 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { bpf } for  pid=2701 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit[2701]: AVC avc:  denied  { bpf } for  pid=2701 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:56:59.665000 audit: BPF prog-id=111 op=LOAD
Dec 13 13:56:59.665000 audit[2701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2614 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:56:59.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366466663862313264303638613338306362326166326239666261
Dec 13 13:56:59.689246 env[1206]: time="2024-12-13T13:56:59.689189039Z" level=info msg="StartContainer for \"5e6dff8b12d068a380cb2af2b9fbad64eb650088df53ee49be16f82179caa8df\" returns successfully"
Dec 13 13:56:59.848431 kubelet[1452]: I1213 13:56:59.848297    1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-85f456d6dd-f45xp" podStartSLOduration=15.29078103 podStartE2EDuration="18.848281414s" podCreationTimestamp="2024-12-13 13:56:41 +0000 UTC" firstStartedPulling="2024-12-13 13:56:56.032632836 +0000 UTC m=+26.184019082" lastFinishedPulling="2024-12-13 13:56:59.59013322 +0000 UTC m=+29.741519466" observedRunningTime="2024-12-13 13:56:59.848185891 +0000 UTC m=+29.999572137" watchObservedRunningTime="2024-12-13 13:56:59.848281414 +0000 UTC m=+29.999667660"
Dec 13 13:56:59.848592 kubelet[1452]: I1213 13:56:59.848456    1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-6tkwm" podStartSLOduration=27.667800023 podStartE2EDuration="29.848451939s" podCreationTimestamp="2024-12-13 13:56:30 +0000 UTC" firstStartedPulling="2024-12-13 13:56:54.103119939 +0000 UTC m=+24.254506185" lastFinishedPulling="2024-12-13 13:56:56.283771855 +0000 UTC m=+26.435158101" observedRunningTime="2024-12-13 13:56:56.844925534 +0000 UTC m=+26.996311740" watchObservedRunningTime="2024-12-13 13:56:59.848451939 +0000 UTC m=+29.999838185"
Dec 13 13:57:00.625941 kubelet[1452]: E1213 13:57:00.625877    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:01.626324 kubelet[1452]: E1213 13:57:01.626291    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:02.627350 kubelet[1452]: E1213 13:57:02.627309    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:03.628351 kubelet[1452]: E1213 13:57:03.628290    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:04.628741 kubelet[1452]: E1213 13:57:04.628695    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:05.038000 audit[2756]: NETFILTER_CFG table=filter:83 family=2 entries=20 op=nft_register_rule pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:57:05.042512 kernel: kauditd_printk_skb: 90 callbacks suppressed
Dec 13 13:57:05.042602 kernel: audit: type=1325 audit(1734098225.038:707): table=filter:83 family=2 entries=20 op=nft_register_rule pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:57:05.042627 kernel: audit: type=1300 audit(1734098225.038:707): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff68df0f0 a2=0 a3=1 items=0 ppid=1607 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:05.038000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff68df0f0 a2=0 a3=1 items=0 ppid=1607 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:05.038000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:57:05.050138 kernel: audit: type=1327 audit(1734098225.038:707): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:57:05.056000 audit[2756]: NETFILTER_CFG table=nat:84 family=2 entries=22 op=nft_register_rule pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:57:05.056000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff68df0f0 a2=0 a3=1 items=0 ppid=1607 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:05.064466 kernel: audit: type=1325 audit(1734098225.056:708): table=nat:84 family=2 entries=22 op=nft_register_rule pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:57:05.064517 kernel: audit: type=1300 audit(1734098225.056:708): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff68df0f0 a2=0 a3=1 items=0 ppid=1607 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:05.064590 kernel: audit: type=1327 audit(1734098225.056:708): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:57:05.056000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:57:05.075000 audit[2759]: NETFILTER_CFG table=filter:85 family=2 entries=32 op=nft_register_rule pid=2759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:57:05.077175 kubelet[1452]: I1213 13:57:05.077120    1452 topology_manager.go:215] "Topology Admit Handler" podUID="303b0a19-ccfb-4310-a790-aa8bc0f35eca" podNamespace="default" podName="nfs-server-provisioner-0"
Dec 13 13:57:05.075000 audit[2759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffeb98ca70 a2=0 a3=1 items=0 ppid=1607 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:05.081432 kernel: audit: type=1325 audit(1734098225.075:709): table=filter:85 family=2 entries=32 op=nft_register_rule pid=2759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:57:05.081488 kernel: audit: type=1300 audit(1734098225.075:709): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffeb98ca70 a2=0 a3=1 items=0 ppid=1607 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:05.081510 kernel: audit: type=1327 audit(1734098225.075:709): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:57:05.075000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:57:05.082014 systemd[1]: Created slice kubepods-besteffort-pod303b0a19_ccfb_4310_a790_aa8bc0f35eca.slice.
Dec 13 13:57:05.083000 audit[2759]: NETFILTER_CFG table=nat:86 family=2 entries=22 op=nft_register_rule pid=2759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:57:05.083000 audit[2759]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffeb98ca70 a2=0 a3=1 items=0 ppid=1607 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:05.083000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:57:05.087279 kernel: audit: type=1325 audit(1734098225.083:710): table=nat:86 family=2 entries=22 op=nft_register_rule pid=2759 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:57:05.123338 kubelet[1452]: I1213 13:57:05.123292    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/303b0a19-ccfb-4310-a790-aa8bc0f35eca-data\") pod \"nfs-server-provisioner-0\" (UID: \"303b0a19-ccfb-4310-a790-aa8bc0f35eca\") " pod="default/nfs-server-provisioner-0"
Dec 13 13:57:05.123338 kubelet[1452]: I1213 13:57:05.123340    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wl8vb\" (UniqueName: \"kubernetes.io/projected/303b0a19-ccfb-4310-a790-aa8bc0f35eca-kube-api-access-wl8vb\") pod \"nfs-server-provisioner-0\" (UID: \"303b0a19-ccfb-4310-a790-aa8bc0f35eca\") " pod="default/nfs-server-provisioner-0"
Dec 13 13:57:05.385639 env[1206]: time="2024-12-13T13:57:05.385534264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:303b0a19-ccfb-4310-a790-aa8bc0f35eca,Namespace:default,Attempt:0,}"
Dec 13 13:57:05.506591 systemd-networkd[1035]: cali60e51b789ff: Link UP
Dec 13 13:57:05.507900 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Dec 13 13:57:05.507972 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready
Dec 13 13:57:05.510859 systemd-networkd[1035]: cali60e51b789ff: Gained carrier
Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.434 [INFO][2763] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.19-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default  303b0a19-ccfb-4310-a790-aa8bc0f35eca 1122 0 2024-12-13 13:57:05 +0000 UTC <nil> <nil> map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s  10.0.0.19  nfs-server-provisioner-0 eth0 nfs-server-provisioner [] []   [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff  [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.19-k8s-nfs--server--provisioner--0-"
Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.434 [INFO][2763] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.19-k8s-nfs--server--provisioner--0-eth0"
Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.457 [INFO][2776] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" HandleID="k8s-pod-network.10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Workload="10.0.0.19-k8s-nfs--server--provisioner--0-eth0"
Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.471 [INFO][2776] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" HandleID="k8s-pod-network.10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Workload="10.0.0.19-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000431720), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.19", "pod":"nfs-server-provisioner-0", "timestamp":"2024-12-13 13:57:05.45761299 +0000 UTC"}, Hostname:"10.0.0.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.471 [INFO][2776] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.471 [INFO][2776] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.471 [INFO][2776] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.19'
Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.474 [INFO][2776] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" host="10.0.0.19"
Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.477 [INFO][2776] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.19"
Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.485 [INFO][2776] ipam/ipam.go 489: Trying affinity for 192.168.37.0/26 host="10.0.0.19"
Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.489 [INFO][2776] ipam/ipam.go 155: Attempting to load block cidr=192.168.37.0/26 host="10.0.0.19"
Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.492 [INFO][2776] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.37.0/26 host="10.0.0.19"
Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.492 [INFO][2776] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.37.0/26 handle="k8s-pod-network.10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" host="10.0.0.19"
Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.493 [INFO][2776] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0
Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.497 [INFO][2776] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.37.0/26 handle="k8s-pod-network.10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" host="10.0.0.19"
Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.502 [INFO][2776] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.37.3/26] block=192.168.37.0/26 handle="k8s-pod-network.10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" host="10.0.0.19"
Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.502 [INFO][2776] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.37.3/26] handle="k8s-pod-network.10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" host="10.0.0.19"
Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.502 [INFO][2776] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 13:57:05.518682 env[1206]: 2024-12-13 13:57:05.502 [INFO][2776] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.37.3/26] IPv6=[] ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" HandleID="k8s-pod-network.10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Workload="10.0.0.19-k8s-nfs--server--provisioner--0-eth0"
Dec 13 13:57:05.519429 env[1206]: 2024-12-13 13:57:05.503 [INFO][2763] cni-plugin/k8s.go 386: Populated endpoint ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.19-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.19-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"303b0a19-ccfb-4310-a790-aa8bc0f35eca", ResourceVersion:"1122", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 57, 5, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.19", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.37.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 13:57:05.519429 env[1206]: 2024-12-13 13:57:05.505 [INFO][2763] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.37.3/32] ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.19-k8s-nfs--server--provisioner--0-eth0"
Dec 13 13:57:05.519429 env[1206]: 2024-12-13 13:57:05.505 [INFO][2763] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.19-k8s-nfs--server--provisioner--0-eth0"
Dec 13 13:57:05.519429 env[1206]: 2024-12-13 13:57:05.508 [INFO][2763] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.19-k8s-nfs--server--provisioner--0-eth0"
Dec 13 13:57:05.519573 env[1206]: 2024-12-13 13:57:05.508 [INFO][2763] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.19-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.19-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"303b0a19-ccfb-4310-a790-aa8bc0f35eca", ResourceVersion:"1122", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 57, 5, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.19", ContainerID:"10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.37.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"82:c8:c7:82:e6:7c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 13:57:05.519573 env[1206]: 2024-12-13 13:57:05.517 [INFO][2763] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.0.0.19-k8s-nfs--server--provisioner--0-eth0"
Dec 13 13:57:05.535615 env[1206]: time="2024-12-13T13:57:05.535532040Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 13:57:05.535615 env[1206]: time="2024-12-13T13:57:05.535578761Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 13:57:05.535615 env[1206]: time="2024-12-13T13:57:05.535589201Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 13:57:05.538372 env[1206]: time="2024-12-13T13:57:05.538305539Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0 pid=2805 runtime=io.containerd.runc.v2
Dec 13 13:57:05.544000 audit[2819]: NETFILTER_CFG table=filter:87 family=2 entries=38 op=nft_register_chain pid=2819 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 13:57:05.544000 audit[2819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19820 a0=3 a1=ffffd981cfb0 a2=0 a3=ffffaf227fa8 items=0 ppid=2115 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:05.544000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 13:57:05.555054 systemd[1]: Started cri-containerd-10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0.scope.
Dec 13 13:57:05.596000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.596000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.596000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.596000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.596000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.596000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.596000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.596000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.596000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.596000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.596000 audit: BPF prog-id=112 op=LOAD
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { bpf } for  pid=2817 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2805 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:05.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653966623466633235323366376439623830396333616630666565
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { perfmon } for  pid=2817 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2805 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:05.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653966623466633235323366376439623830396333616630666565
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { bpf } for  pid=2817 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { bpf } for  pid=2817 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { bpf } for  pid=2817 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { perfmon } for  pid=2817 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { perfmon } for  pid=2817 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { perfmon } for  pid=2817 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { perfmon } for  pid=2817 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { perfmon } for  pid=2817 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { bpf } for  pid=2817 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { bpf } for  pid=2817 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit: BPF prog-id=113 op=LOAD
Dec 13 13:57:05.597000 audit[2817]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2805 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:05.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653966623466633235323366376439623830396333616630666565
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { bpf } for  pid=2817 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { bpf } for  pid=2817 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { perfmon } for  pid=2817 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { perfmon } for  pid=2817 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { perfmon } for  pid=2817 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { perfmon } for  pid=2817 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { perfmon } for  pid=2817 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { bpf } for  pid=2817 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { bpf } for  pid=2817 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit: BPF prog-id=114 op=LOAD
Dec 13 13:57:05.597000 audit[2817]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2805 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:05.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653966623466633235323366376439623830396333616630666565
Dec 13 13:57:05.597000 audit: BPF prog-id=114 op=UNLOAD
Dec 13 13:57:05.597000 audit: BPF prog-id=113 op=UNLOAD
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { bpf } for  pid=2817 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { bpf } for  pid=2817 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { bpf } for  pid=2817 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { perfmon } for  pid=2817 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { perfmon } for  pid=2817 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { perfmon } for  pid=2817 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { perfmon } for  pid=2817 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { perfmon } for  pid=2817 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { bpf } for  pid=2817 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit[2817]: AVC avc:  denied  { bpf } for  pid=2817 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:05.597000 audit: BPF prog-id=115 op=LOAD
Dec 13 13:57:05.597000 audit[2817]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2805 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:05.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130653966623466633235323366376439623830396333616630666565
Dec 13 13:57:05.599158 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address
Dec 13 13:57:05.621466 env[1206]: time="2024-12-13T13:57:05.621210734Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:303b0a19-ccfb-4310-a790-aa8bc0f35eca,Namespace:default,Attempt:0,} returns sandbox id \"10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0\""
Dec 13 13:57:05.622981 env[1206]: time="2024-12-13T13:57:05.622951571Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\""
Dec 13 13:57:05.629096 kubelet[1452]: E1213 13:57:05.629060    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:06.629912 kubelet[1452]: E1213 13:57:06.629868    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:07.198611 systemd-networkd[1035]: cali60e51b789ff: Gained IPv6LL
Dec 13 13:57:07.631127 kubelet[1452]: E1213 13:57:07.631004    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:07.698455 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4018416669.mount: Deactivated successfully.
Dec 13 13:57:08.008176 update_engine[1197]: I1213 13:57:08.008056  1197 update_attempter.cc:509] Updating boot flags...
Dec 13 13:57:08.631930 kubelet[1452]: E1213 13:57:08.631878    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:09.486872 env[1206]: time="2024-12-13T13:57:09.486821428Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:57:09.490022 env[1206]: time="2024-12-13T13:57:09.489994043Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:57:09.491681 env[1206]: time="2024-12-13T13:57:09.491642671Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:57:09.493207 env[1206]: time="2024-12-13T13:57:09.493183778Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:57:09.494659 env[1206]: time="2024-12-13T13:57:09.494621963Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\""
Dec 13 13:57:09.496648 env[1206]: time="2024-12-13T13:57:09.496610357Z" level=info msg="CreateContainer within sandbox \"10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}"
Dec 13 13:57:09.504957 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3711632019.mount: Deactivated successfully.
Dec 13 13:57:09.508323 env[1206]: time="2024-12-13T13:57:09.508222718Z" level=info msg="CreateContainer within sandbox \"10e9fb4fc2523f7d9b809c3af0fee434da13e195ee8ea8616e92bba704a82ca0\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"f6ae0729dea5a71586cc876c7049fda45854854912adcc3a5bb1398d9cedd843\""
Dec 13 13:57:09.508773 env[1206]: time="2024-12-13T13:57:09.508749087Z" level=info msg="StartContainer for \"f6ae0729dea5a71586cc876c7049fda45854854912adcc3a5bb1398d9cedd843\""
Dec 13 13:57:09.526598 systemd[1]: Started cri-containerd-f6ae0729dea5a71586cc876c7049fda45854854912adcc3a5bb1398d9cedd843.scope.
Dec 13 13:57:09.575000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.575000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.575000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.575000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.575000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.575000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.575000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.575000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.575000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.575000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.575000 audit: BPF prog-id=116 op=LOAD
Dec 13 13:57:09.575000 audit[2870]: AVC avc:  denied  { bpf } for  pid=2870 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.575000 audit[2870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2805 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:09.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636616530373239646561356137313538366363383736633730343966
Dec 13 13:57:09.576000 audit[2870]: AVC avc:  denied  { perfmon } for  pid=2870 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.576000 audit[2870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2805 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:09.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636616530373239646561356137313538366363383736633730343966
Dec 13 13:57:09.576000 audit[2870]: AVC avc:  denied  { bpf } for  pid=2870 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.576000 audit[2870]: AVC avc:  denied  { bpf } for  pid=2870 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.576000 audit[2870]: AVC avc:  denied  { bpf } for  pid=2870 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.576000 audit[2870]: AVC avc:  denied  { perfmon } for  pid=2870 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.576000 audit[2870]: AVC avc:  denied  { perfmon } for  pid=2870 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.576000 audit[2870]: AVC avc:  denied  { perfmon } for  pid=2870 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.576000 audit[2870]: AVC avc:  denied  { perfmon } for  pid=2870 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.576000 audit[2870]: AVC avc:  denied  { perfmon } for  pid=2870 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.576000 audit[2870]: AVC avc:  denied  { bpf } for  pid=2870 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.576000 audit[2870]: AVC avc:  denied  { bpf } for  pid=2870 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.576000 audit: BPF prog-id=117 op=LOAD
Dec 13 13:57:09.576000 audit[2870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2805 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:09.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636616530373239646561356137313538366363383736633730343966
Dec 13 13:57:09.577000 audit[2870]: AVC avc:  denied  { bpf } for  pid=2870 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.577000 audit[2870]: AVC avc:  denied  { bpf } for  pid=2870 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.577000 audit[2870]: AVC avc:  denied  { perfmon } for  pid=2870 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.577000 audit[2870]: AVC avc:  denied  { perfmon } for  pid=2870 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.577000 audit[2870]: AVC avc:  denied  { perfmon } for  pid=2870 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.577000 audit[2870]: AVC avc:  denied  { perfmon } for  pid=2870 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.577000 audit[2870]: AVC avc:  denied  { perfmon } for  pid=2870 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.577000 audit[2870]: AVC avc:  denied  { bpf } for  pid=2870 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.577000 audit[2870]: AVC avc:  denied  { bpf } for  pid=2870 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.577000 audit: BPF prog-id=118 op=LOAD
Dec 13 13:57:09.577000 audit[2870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2805 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:09.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636616530373239646561356137313538366363383736633730343966
Dec 13 13:57:09.577000 audit: BPF prog-id=118 op=UNLOAD
Dec 13 13:57:09.577000 audit: BPF prog-id=117 op=UNLOAD
Dec 13 13:57:09.577000 audit[2870]: AVC avc:  denied  { bpf } for  pid=2870 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.577000 audit[2870]: AVC avc:  denied  { bpf } for  pid=2870 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.577000 audit[2870]: AVC avc:  denied  { bpf } for  pid=2870 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.577000 audit[2870]: AVC avc:  denied  { perfmon } for  pid=2870 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.577000 audit[2870]: AVC avc:  denied  { perfmon } for  pid=2870 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.577000 audit[2870]: AVC avc:  denied  { perfmon } for  pid=2870 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.577000 audit[2870]: AVC avc:  denied  { perfmon } for  pid=2870 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.577000 audit[2870]: AVC avc:  denied  { perfmon } for  pid=2870 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.577000 audit[2870]: AVC avc:  denied  { bpf } for  pid=2870 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.577000 audit[2870]: AVC avc:  denied  { bpf } for  pid=2870 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:09.577000 audit: BPF prog-id=119 op=LOAD
Dec 13 13:57:09.577000 audit[2870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2805 pid=2870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:09.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636616530373239646561356137313538366363383736633730343966
Dec 13 13:57:09.593688 env[1206]: time="2024-12-13T13:57:09.593640234Z" level=info msg="StartContainer for \"f6ae0729dea5a71586cc876c7049fda45854854912adcc3a5bb1398d9cedd843\" returns successfully"
Dec 13 13:57:09.632120 kubelet[1452]: E1213 13:57:09.632083    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:09.678000 audit[2899]: AVC avc:  denied  { search } for  pid=2899 comm="rpcbind" name="crypto" dev="proc" ino=16980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0
Dec 13 13:57:09.678000 audit[2899]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8a23f000 a2=0 a3=0 items=0 ppid=2880 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 key=(null)
Dec 13 13:57:09.678000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77
Dec 13 13:57:09.725000 audit[2904]: AVC avc:  denied  { search } for  pid=2904 comm="dbus-daemon" name="crypto" dev="proc" ino=16980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0
Dec 13 13:57:09.725000 audit[2904]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffae6cf000 a2=0 a3=0 items=0 ppid=2880 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 key=(null)
Dec 13 13:57:09.725000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65
Dec 13 13:57:09.732000 audit[2905]: AVC avc:  denied  { watch } for  pid=2905 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537183 scontext=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c75,c144 tclass=dir permissive=0
Dec 13 13:57:09.732000 audit[2905]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaaf27c3a40 a2=2c8 a3=aaaaf27a8a60 items=0 ppid=2880 pid=2905 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 key=(null)
Dec 13 13:57:09.732000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65
Dec 13 13:57:09.737000 audit[2906]: AVC avc:  denied  { read } for  pid=2906 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=17891 scontext=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0
Dec 13 13:57:09.737000 audit[2906]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffff8d5ea570 a2=80000 a3=0 items=0 ppid=2880 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 key=(null)
Dec 13 13:57:09.737000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66
Dec 13 13:57:09.738000 audit[2906]: AVC avc:  denied  { search } for  pid=2906 comm="ganesha.nfsd" name="crypto" dev="proc" ino=16980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0
Dec 13 13:57:09.738000 audit[2906]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8c97f000 a2=0 a3=0 items=0 ppid=2880 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c75,c144 key=(null)
Dec 13 13:57:09.738000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66
Dec 13 13:57:09.888000 audit[2927]: NETFILTER_CFG table=filter:88 family=2 entries=20 op=nft_register_rule pid=2927 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:57:09.888000 audit[2927]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc7c7b720 a2=0 a3=1 items=0 ppid=1607 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:09.888000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:57:09.901000 audit[2927]: NETFILTER_CFG table=nat:89 family=2 entries=106 op=nft_register_chain pid=2927 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Dec 13 13:57:09.901000 audit[2927]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffc7c7b720 a2=0 a3=1 items=0 ppid=1607 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:09.901000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Dec 13 13:57:10.604489 kubelet[1452]: E1213 13:57:10.604449    1452 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:10.632785 kubelet[1452]: E1213 13:57:10.632746    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:11.633095 kubelet[1452]: E1213 13:57:11.633056    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:12.633937 kubelet[1452]: E1213 13:57:12.633894    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:13.634256 kubelet[1452]: E1213 13:57:13.634198    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:14.635749 kubelet[1452]: E1213 13:57:14.635704    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:15.636429 kubelet[1452]: E1213 13:57:15.636380    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:16.637088 kubelet[1452]: E1213 13:57:16.637048    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:17.463757 kubelet[1452]: E1213 13:57:17.463711    1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"
Dec 13 13:57:17.478479 kubelet[1452]: I1213 13:57:17.477852    1452 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=8.605268463 podStartE2EDuration="12.477829511s" podCreationTimestamp="2024-12-13 13:57:05 +0000 UTC" firstStartedPulling="2024-12-13 13:57:05.622664765 +0000 UTC m=+35.774051011" lastFinishedPulling="2024-12-13 13:57:09.495225813 +0000 UTC m=+39.646612059" observedRunningTime="2024-12-13 13:57:09.877114654 +0000 UTC m=+40.028500900" watchObservedRunningTime="2024-12-13 13:57:17.477829511 +0000 UTC m=+47.629215757"
Dec 13 13:57:17.638161 kubelet[1452]: E1213 13:57:17.638129    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:18.639215 kubelet[1452]: E1213 13:57:18.639180    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:19.015132 kubelet[1452]: I1213 13:57:19.015092    1452 topology_manager.go:215] "Topology Admit Handler" podUID="e9eb12d9-2578-4d31-b341-7371387e6d47" podNamespace="default" podName="test-pod-1"
Dec 13 13:57:19.020603 systemd[1]: Created slice kubepods-besteffort-pode9eb12d9_2578_4d31_b341_7371387e6d47.slice.
Dec 13 13:57:19.196393 kubelet[1452]: I1213 13:57:19.196346    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-3f4e66f3-3040-40a1-89fc-d1a1b861b491\" (UniqueName: \"kubernetes.io/nfs/e9eb12d9-2578-4d31-b341-7371387e6d47-pvc-3f4e66f3-3040-40a1-89fc-d1a1b861b491\") pod \"test-pod-1\" (UID: \"e9eb12d9-2578-4d31-b341-7371387e6d47\") " pod="default/test-pod-1"
Dec 13 13:57:19.196548 kubelet[1452]: I1213 13:57:19.196401    1452 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ll5hz\" (UniqueName: \"kubernetes.io/projected/e9eb12d9-2578-4d31-b341-7371387e6d47-kube-api-access-ll5hz\") pod \"test-pod-1\" (UID: \"e9eb12d9-2578-4d31-b341-7371387e6d47\") " pod="default/test-pod-1"
Dec 13 13:57:19.306000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.311273 kernel: Failed to create system directory netfs
Dec 13 13:57:19.311314 kernel: Failed to create system directory netfs
Dec 13 13:57:19.311340 kernel: kauditd_printk_skb: 140 callbacks suppressed
Dec 13 13:57:19.311374 kernel: audit: type=1400 audit(1734098239.306:755): avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.313724 kernel: Failed to create system directory netfs
Dec 13 13:57:19.313858 kernel: audit: type=1400 audit(1734098239.306:755): avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.306000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.316192 kernel: Failed to create system directory netfs
Dec 13 13:57:19.316233 kernel: audit: type=1400 audit(1734098239.306:755): avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.306000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.306000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.320724 kernel: audit: type=1400 audit(1734098239.306:755): avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.320781 kernel: audit: type=1300 audit(1734098239.306:755): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab037785e0 a1=12c14 a2=aaaae373e028 a3=aaab03769010 items=0 ppid=9 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:19.306000 audit[2958]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab037785e0 a1=12c14 a2=aaaae373e028 a3=aaab03769010 items=0 ppid=9 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:19.323443 kernel: audit: type=1327 audit(1734098239.306:755): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Dec 13 13:57:19.306000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Dec 13 13:57:19.322000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.328697 kernel: Failed to create system directory fscache
Dec 13 13:57:19.328750 kernel: audit: type=1400 audit(1734098239.322:756): avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.328783 kernel: Failed to create system directory fscache
Dec 13 13:57:19.328799 kernel: audit: type=1400 audit(1734098239.322:756): avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.322000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.331058 kernel: Failed to create system directory fscache
Dec 13 13:57:19.331118 kernel: audit: type=1400 audit(1734098239.322:756): avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.322000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.331473 kernel: Failed to create system directory fscache
Dec 13 13:57:19.333404 kernel: audit: type=1400 audit(1734098239.322:756): avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.322000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.335793 kernel: Failed to create system directory fscache
Dec 13 13:57:19.322000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.322000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.336275 kernel: Failed to create system directory fscache
Dec 13 13:57:19.336560 kernel: Failed to create system directory fscache
Dec 13 13:57:19.322000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.322000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.337428 kernel: Failed to create system directory fscache
Dec 13 13:57:19.337467 kernel: Failed to create system directory fscache
Dec 13 13:57:19.322000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.322000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.338345 kernel: Failed to create system directory fscache
Dec 13 13:57:19.338402 kernel: Failed to create system directory fscache
Dec 13 13:57:19.322000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.322000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.322000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.339523 kernel: Failed to create system directory fscache
Dec 13 13:57:19.339551 kernel: Failed to create system directory fscache
Dec 13 13:57:19.339575 kernel: Failed to create system directory fscache
Dec 13 13:57:19.322000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.340655 kernel: FS-Cache: Loaded
Dec 13 13:57:19.322000 audit[2958]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0398b210 a1=4c344 a2=aaaae373e028 a3=aaab03769010 items=0 ppid=9 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:19.322000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.362567 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.362608 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.362627 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.362642 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.363397 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.363443 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.364656 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.364703 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.364718 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.365488 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.365530 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.366308 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.366363 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.367549 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.367585 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.367600 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.368382 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.368431 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.370116 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.370168 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.370198 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.370224 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.370502 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.371298 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.371354 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.372554 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.372584 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.372600 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.373382 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.373426 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.374650 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.374680 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.374697 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.375486 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.375517 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.376303 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.376341 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.377540 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.377575 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.377589 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.378389 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.378424 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.379643 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.379669 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.379693 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.380481 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.380515 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.381301 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.381328 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.382551 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.382583 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.382598 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.383384 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.383405 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.384635 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.384660 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.384679 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.385473 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.385496 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.386296 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.386323 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.387549 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.387572 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.387586 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.388383 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.388406 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.389636 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.389664 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.389678 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.390478 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.390507 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.391309 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.391334 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.392560 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.392588 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.392603 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.393394 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.393417 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.394647 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.394664 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.394686 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.395485 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.395512 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.396312 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.396350 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.397572 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.397597 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.397619 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.398405 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.398426 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.399268 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.399292 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.400534 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.400570 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.400593 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.401365 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.401394 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.402613 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.402642 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.402661 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.403456 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.403505 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.404302 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.404323 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.405571 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.405596 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.405621 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.406403 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.406427 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.407659 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.407681 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.407695 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.408502 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.408524 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.409328 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.409351 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.410590 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.410631 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.410661 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.411415 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.411437 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.412665 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.412688 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.412702 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.413537 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.413571 kernel: Failed to create system directory sunrpc
Dec 13 13:57:19.354000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.423686 kernel: RPC: Registered named UNIX socket transport module.
Dec 13 13:57:19.423834 kernel: RPC: Registered udp transport module.
Dec 13 13:57:19.423865 kernel: RPC: Registered tcp transport module.
Dec 13 13:57:19.423895 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module.
Dec 13 13:57:19.354000 audit[2958]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab039d7560 a1=14a504 a2=aaaae373e028 a3=aaab03769010 items=6 ppid=9 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:19.354000 audit: CWD cwd="/"
Dec 13 13:57:19.354000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 13:57:19.354000 audit: PATH item=1 name=(null) inode=18091 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 13:57:19.354000 audit: PATH item=2 name=(null) inode=18091 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 13:57:19.354000 audit: PATH item=3 name=(null) inode=18092 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 13:57:19.354000 audit: PATH item=4 name=(null) inode=18091 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 13:57:19.354000 audit: PATH item=5 name=(null) inode=18093 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Dec 13 13:57:19.354000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.450391 kernel: Failed to create system directory nfs
Dec 13 13:57:19.450440 kernel: Failed to create system directory nfs
Dec 13 13:57:19.450455 kernel: Failed to create system directory nfs
Dec 13 13:57:19.450468 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.451523 kernel: Failed to create system directory nfs
Dec 13 13:57:19.451544 kernel: Failed to create system directory nfs
Dec 13 13:57:19.451563 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.452306 kernel: Failed to create system directory nfs
Dec 13 13:57:19.452326 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.453495 kernel: Failed to create system directory nfs
Dec 13 13:57:19.453515 kernel: Failed to create system directory nfs
Dec 13 13:57:19.453532 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.454272 kernel: Failed to create system directory nfs
Dec 13 13:57:19.454299 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.455456 kernel: Failed to create system directory nfs
Dec 13 13:57:19.455480 kernel: Failed to create system directory nfs
Dec 13 13:57:19.455498 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.456246 kernel: Failed to create system directory nfs
Dec 13 13:57:19.456267 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.457417 kernel: Failed to create system directory nfs
Dec 13 13:57:19.457445 kernel: Failed to create system directory nfs
Dec 13 13:57:19.457464 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.458602 kernel: Failed to create system directory nfs
Dec 13 13:57:19.458624 kernel: Failed to create system directory nfs
Dec 13 13:57:19.458637 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.459394 kernel: Failed to create system directory nfs
Dec 13 13:57:19.459416 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.460591 kernel: Failed to create system directory nfs
Dec 13 13:57:19.460610 kernel: Failed to create system directory nfs
Dec 13 13:57:19.460633 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.461381 kernel: Failed to create system directory nfs
Dec 13 13:57:19.461411 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.462569 kernel: Failed to create system directory nfs
Dec 13 13:57:19.462588 kernel: Failed to create system directory nfs
Dec 13 13:57:19.462605 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.463360 kernel: Failed to create system directory nfs
Dec 13 13:57:19.463382 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.464552 kernel: Failed to create system directory nfs
Dec 13 13:57:19.464574 kernel: Failed to create system directory nfs
Dec 13 13:57:19.464588 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.465343 kernel: Failed to create system directory nfs
Dec 13 13:57:19.465366 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.466529 kernel: Failed to create system directory nfs
Dec 13 13:57:19.466558 kernel: Failed to create system directory nfs
Dec 13 13:57:19.466574 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.467314 kernel: Failed to create system directory nfs
Dec 13 13:57:19.467345 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.468525 kernel: Failed to create system directory nfs
Dec 13 13:57:19.468544 kernel: Failed to create system directory nfs
Dec 13 13:57:19.468562 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.469309 kernel: Failed to create system directory nfs
Dec 13 13:57:19.469328 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.470508 kernel: Failed to create system directory nfs
Dec 13 13:57:19.470530 kernel: Failed to create system directory nfs
Dec 13 13:57:19.470586 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.471289 kernel: Failed to create system directory nfs
Dec 13 13:57:19.471306 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.472466 kernel: Failed to create system directory nfs
Dec 13 13:57:19.472521 kernel: Failed to create system directory nfs
Dec 13 13:57:19.472541 kernel: Failed to create system directory nfs
Dec 13 13:57:19.443000 audit[2958]: AVC avc:  denied  { confidentiality } for  pid=2958 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.487266 kernel: FS-Cache: Netfs 'nfs' registered for caching
Dec 13 13:57:19.443000 audit[2958]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab03b806f0 a1=116204 a2=aaaae373e028 a3=aaab03769010 items=0 ppid=9 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:19.443000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.515281 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.515307 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.515320 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.515420 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.516506 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.516548 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.516567 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.517303 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.517368 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.518520 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.518548 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.518562 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.519323 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.519384 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.520538 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.520595 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.520615 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.521342 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.521397 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.522548 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.522602 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.522624 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.523349 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.523376 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.524560 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.524621 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.524641 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.525361 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.525378 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.526567 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.526585 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.526611 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.527369 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.527386 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.528613 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.528638 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.528652 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.529453 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.529524 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.530642 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.530678 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.530696 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.531450 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.531495 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.532243 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.532289 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.533449 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.533496 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.533516 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.534250 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.534284 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.535457 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.535523 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.535554 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.536280 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.536321 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.537482 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.537505 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.537518 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.538246 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.538286 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.539472 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.539502 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.539528 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.540301 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.540350 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.541504 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.541526 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.541539 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.542295 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.542322 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.543500 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.543522 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.543536 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.544289 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.544317 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.545496 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.545524 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.545539 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.546306 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.546349 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.547516 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.547558 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.547573 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.548250 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.548275 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.549498 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.549523 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.549538 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.550252 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.550273 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.551468 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.551531 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.551557 kernel: Failed to create system directory nfs4
Dec 13 13:57:19.506000 audit[2964]: AVC avc:  denied  { confidentiality } for  pid=2964 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.640651 kubelet[1452]: E1213 13:57:19.640520    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:19.651540 kernel: NFS: Registering the id_resolver key type
Dec 13 13:57:19.651608 kernel: Key type id_resolver registered
Dec 13 13:57:19.651629 kernel: Key type id_legacy registered
Dec 13 13:57:19.506000 audit[2964]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff976ba010 a1=19c49c a2=aaaae355e028 a3=aaaaffbc0010 items=0 ppid=9 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:19.506000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.665339 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.665371 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.665396 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.666578 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.666603 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.666618 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.667412 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.667435 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.668670 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.668693 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.668706 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.669517 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.669544 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.670343 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.670380 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.671572 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.671596 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.671609 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.672402 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.672426 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.673654 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.673692 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.673706 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.674512 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.674558 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.661000 audit[2965]: AVC avc:  denied  { confidentiality } for  pid=2965 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Dec 13 13:57:19.675316 kernel: Failed to create system directory rpcgss
Dec 13 13:57:19.661000 audit[2965]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffa8c62010 a1=5ee04 a2=aaaae304e028 a3=aaaae71d7010 items=0 ppid=9 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:19.661000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36
Dec 13 13:57:19.689241 nfsidmap[2973]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain'
Dec 13 13:57:19.691998 nfsidmap[2976]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'localdomain'
Dec 13 13:57:19.713000 audit[1274]: AVC avc:  denied  { watch_reads } for  pid=1274 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2447 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Dec 13 13:57:19.713000 audit[1]: AVC avc:  denied  { watch_reads } for  pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2447 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Dec 13 13:57:19.713000 audit[1274]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab228984d0 a2=10 a3=0 items=0 ppid=1 pid=1274 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:19.713000 audit[1]: AVC avc:  denied  { watch_reads } for  pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2447 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Dec 13 13:57:19.713000 audit[1]: AVC avc:  denied  { watch_reads } for  pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2447 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Dec 13 13:57:19.713000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572
Dec 13 13:57:19.713000 audit[1274]: AVC avc:  denied  { watch_reads } for  pid=1274 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2447 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Dec 13 13:57:19.713000 audit[1274]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab228984d0 a2=10 a3=0 items=0 ppid=1 pid=1274 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:19.713000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572
Dec 13 13:57:19.713000 audit[1274]: AVC avc:  denied  { watch_reads } for  pid=1274 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2447 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Dec 13 13:57:19.713000 audit[1274]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab228984d0 a2=10 a3=0 items=0 ppid=1 pid=1274 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:19.713000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572
Dec 13 13:57:19.923721 env[1206]: time="2024-12-13T13:57:19.923615068Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e9eb12d9-2578-4d31-b341-7371387e6d47,Namespace:default,Attempt:0,}"
Dec 13 13:57:20.041252 systemd-networkd[1035]: cali5ec59c6bf6e: Link UP
Dec 13 13:57:20.042755 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Dec 13 13:57:20.042839 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready
Dec 13 13:57:20.042894 systemd-networkd[1035]: cali5ec59c6bf6e: Gained carrier
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:19.968 [INFO][2979] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.0.0.19-k8s-test--pod--1-eth0  default  e9eb12d9-2578-4d31-b341-7371387e6d47 1183 0 2024-12-13 13:57:05 +0000 UTC <nil> <nil> map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s  10.0.0.19  test-pod-1 eth0 default [] []   [kns.default ksa.default.default] cali5ec59c6bf6e  [] []}} ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.19-k8s-test--pod--1-"
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:19.969 [INFO][2979] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.19-k8s-test--pod--1-eth0"
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:19.992 [INFO][2994] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" HandleID="k8s-pod-network.08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Workload="10.0.0.19-k8s-test--pod--1-eth0"
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.005 [INFO][2994] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" HandleID="k8s-pod-network.08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Workload="10.0.0.19-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003993e0), Attrs:map[string]string{"namespace":"default", "node":"10.0.0.19", "pod":"test-pod-1", "timestamp":"2024-12-13 13:57:19.992582906 +0000 UTC"}, Hostname:"10.0.0.19", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.005 [INFO][2994] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock.
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.005 [INFO][2994] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock.
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.005 [INFO][2994] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.0.0.19'
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.007 [INFO][2994] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" host="10.0.0.19"
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.012 [INFO][2994] ipam/ipam.go 372: Looking up existing affinities for host host="10.0.0.19"
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.020 [INFO][2994] ipam/ipam.go 489: Trying affinity for 192.168.37.0/26 host="10.0.0.19"
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.023 [INFO][2994] ipam/ipam.go 155: Attempting to load block cidr=192.168.37.0/26 host="10.0.0.19"
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.026 [INFO][2994] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.37.0/26 host="10.0.0.19"
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.026 [INFO][2994] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.37.0/26 handle="k8s-pod-network.08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" host="10.0.0.19"
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.028 [INFO][2994] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.032 [INFO][2994] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.37.0/26 handle="k8s-pod-network.08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" host="10.0.0.19"
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.037 [INFO][2994] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.37.4/26] block=192.168.37.0/26 handle="k8s-pod-network.08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" host="10.0.0.19"
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.037 [INFO][2994] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.37.4/26] handle="k8s-pod-network.08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" host="10.0.0.19"
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.037 [INFO][2994] ipam/ipam_plugin.go 374: Released host-wide IPAM lock.
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.037 [INFO][2994] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.37.4/26] IPv6=[] ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" HandleID="k8s-pod-network.08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Workload="10.0.0.19-k8s-test--pod--1-eth0"
Dec 13 13:57:20.053862 env[1206]: 2024-12-13 13:57:20.039 [INFO][2979] cni-plugin/k8s.go 386: Populated endpoint ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.19-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.19-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e9eb12d9-2578-4d31-b341-7371387e6d47", ResourceVersion:"1183", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 57, 5, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.19", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 13:57:20.054465 env[1206]: 2024-12-13 13:57:20.039 [INFO][2979] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.37.4/32] ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.19-k8s-test--pod--1-eth0"
Dec 13 13:57:20.054465 env[1206]: 2024-12-13 13:57:20.039 [INFO][2979] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.19-k8s-test--pod--1-eth0"
Dec 13 13:57:20.054465 env[1206]: 2024-12-13 13:57:20.043 [INFO][2979] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.19-k8s-test--pod--1-eth0"
Dec 13 13:57:20.054465 env[1206]: 2024-12-13 13:57:20.043 [INFO][2979] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.19-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.0.0.19-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"e9eb12d9-2578-4d31-b341-7371387e6d47", ResourceVersion:"1183", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 13, 57, 5, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.0.0.19", ContainerID:"08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.37.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"d6:8e:54:66:74:c7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Dec 13 13:57:20.054465 env[1206]: 2024-12-13 13:57:20.052 [INFO][2979] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.0.0.19-k8s-test--pod--1-eth0"
Dec 13 13:57:20.060000 audit[3015]: NETFILTER_CFG table=filter:90 family=2 entries=38 op=nft_register_chain pid=3015 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Dec 13 13:57:20.060000 audit[3015]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19400 a0=3 a1=ffffd6cf2e80 a2=0 a3=ffff8704bfa8 items=0 ppid=2115 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:20.060000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Dec 13 13:57:20.064660 env[1206]: time="2024-12-13T13:57:20.064571551Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Dec 13 13:57:20.064660 env[1206]: time="2024-12-13T13:57:20.064614511Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Dec 13 13:57:20.064660 env[1206]: time="2024-12-13T13:57:20.064624992Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Dec 13 13:57:20.064977 env[1206]: time="2024-12-13T13:57:20.064937795Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9 pid=3024 runtime=io.containerd.runc.v2
Dec 13 13:57:20.075555 systemd[1]: Started cri-containerd-08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9.scope.
Dec 13 13:57:20.112000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit: BPF prog-id=120 op=LOAD
Dec 13 13:57:20.112000 audit[3033]: AVC avc:  denied  { bpf } for  pid=3033 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3024 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:20.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038646231373532366336316531336330353531383364346136653762
Dec 13 13:57:20.112000 audit[3033]: AVC avc:  denied  { perfmon } for  pid=3033 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3024 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:20.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038646231373532366336316531336330353531383364346136653762
Dec 13 13:57:20.112000 audit[3033]: AVC avc:  denied  { bpf } for  pid=3033 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[3033]: AVC avc:  denied  { bpf } for  pid=3033 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[3033]: AVC avc:  denied  { bpf } for  pid=3033 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[3033]: AVC avc:  denied  { perfmon } for  pid=3033 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[3033]: AVC avc:  denied  { perfmon } for  pid=3033 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[3033]: AVC avc:  denied  { perfmon } for  pid=3033 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[3033]: AVC avc:  denied  { perfmon } for  pid=3033 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[3033]: AVC avc:  denied  { perfmon } for  pid=3033 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[3033]: AVC avc:  denied  { bpf } for  pid=3033 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit[3033]: AVC avc:  denied  { bpf } for  pid=3033 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.112000 audit: BPF prog-id=121 op=LOAD
Dec 13 13:57:20.112000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3024 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:20.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038646231373532366336316531336330353531383364346136653762
Dec 13 13:57:20.113000 audit[3033]: AVC avc:  denied  { bpf } for  pid=3033 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.113000 audit[3033]: AVC avc:  denied  { bpf } for  pid=3033 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.113000 audit[3033]: AVC avc:  denied  { perfmon } for  pid=3033 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.113000 audit[3033]: AVC avc:  denied  { perfmon } for  pid=3033 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.113000 audit[3033]: AVC avc:  denied  { perfmon } for  pid=3033 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.113000 audit[3033]: AVC avc:  denied  { perfmon } for  pid=3033 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.113000 audit[3033]: AVC avc:  denied  { perfmon } for  pid=3033 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.113000 audit[3033]: AVC avc:  denied  { bpf } for  pid=3033 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.113000 audit[3033]: AVC avc:  denied  { bpf } for  pid=3033 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.113000 audit: BPF prog-id=122 op=LOAD
Dec 13 13:57:20.113000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3024 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:20.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038646231373532366336316531336330353531383364346136653762
Dec 13 13:57:20.113000 audit: BPF prog-id=122 op=UNLOAD
Dec 13 13:57:20.113000 audit: BPF prog-id=121 op=UNLOAD
Dec 13 13:57:20.113000 audit[3033]: AVC avc:  denied  { bpf } for  pid=3033 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.113000 audit[3033]: AVC avc:  denied  { bpf } for  pid=3033 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.113000 audit[3033]: AVC avc:  denied  { bpf } for  pid=3033 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.113000 audit[3033]: AVC avc:  denied  { perfmon } for  pid=3033 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.113000 audit[3033]: AVC avc:  denied  { perfmon } for  pid=3033 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.113000 audit[3033]: AVC avc:  denied  { perfmon } for  pid=3033 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.113000 audit[3033]: AVC avc:  denied  { perfmon } for  pid=3033 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.113000 audit[3033]: AVC avc:  denied  { perfmon } for  pid=3033 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.113000 audit[3033]: AVC avc:  denied  { bpf } for  pid=3033 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.113000 audit[3033]: AVC avc:  denied  { bpf } for  pid=3033 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.113000 audit: BPF prog-id=123 op=LOAD
Dec 13 13:57:20.113000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3024 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:20.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038646231373532366336316531336330353531383364346136653762
Dec 13 13:57:20.115283 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address
Dec 13 13:57:20.134495 env[1206]: time="2024-12-13T13:57:20.134446330Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:e9eb12d9-2578-4d31-b341-7371387e6d47,Namespace:default,Attempt:0,} returns sandbox id \"08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9\""
Dec 13 13:57:20.136029 env[1206]: time="2024-12-13T13:57:20.135938185Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\""
Dec 13 13:57:20.412362 env[1206]: time="2024-12-13T13:57:20.412290706Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:57:20.414796 env[1206]: time="2024-12-13T13:57:20.414757172Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:57:20.416284 env[1206]: time="2024-12-13T13:57:20.416225108Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:57:20.419095 env[1206]: time="2024-12-13T13:57:20.419052898Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e04edf30a4ea4c5a4107110797c72d3ee8a654415f00acd4019be17218afd9a1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Dec 13 13:57:20.419398 env[1206]: time="2024-12-13T13:57:20.419374901Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:d5cb91e7550dca840aad69277b6dbccf8dc3739757998181746daf777a8bd9de\""
Dec 13 13:57:20.421941 env[1206]: time="2024-12-13T13:57:20.421909888Z" level=info msg="CreateContainer within sandbox \"08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9\" for container &ContainerMetadata{Name:test,Attempt:0,}"
Dec 13 13:57:20.442313 env[1206]: time="2024-12-13T13:57:20.442258423Z" level=info msg="CreateContainer within sandbox \"08db17526c61e13c055183d4a6e7bbcb5a7074ee1f78b877605859eea10c7ac9\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"964f8048d6bdadecca954cecf68ce5601a0eea1fe81cabc2bfcb8a555f63ee48\""
Dec 13 13:57:20.442762 env[1206]: time="2024-12-13T13:57:20.442736348Z" level=info msg="StartContainer for \"964f8048d6bdadecca954cecf68ce5601a0eea1fe81cabc2bfcb8a555f63ee48\""
Dec 13 13:57:20.461931 systemd[1]: Started cri-containerd-964f8048d6bdadecca954cecf68ce5601a0eea1fe81cabc2bfcb8a555f63ee48.scope.
Dec 13 13:57:20.493000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.493000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.493000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.493000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.493000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.493000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.493000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.493000 audit[1]: AVC avc:  denied  { perfmon } for  pid=1 comm="systemd" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.493000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.493000 audit[1]: AVC avc:  denied  { bpf } for  pid=1 comm="systemd" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.493000 audit: BPF prog-id=124 op=LOAD
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { bpf } for  pid=3066 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3024 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:20.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936346638303438643662646164656363613935346365636636386365
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { perfmon } for  pid=3066 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3024 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:20.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936346638303438643662646164656363613935346365636636386365
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { bpf } for  pid=3066 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { bpf } for  pid=3066 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { bpf } for  pid=3066 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { perfmon } for  pid=3066 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { perfmon } for  pid=3066 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { perfmon } for  pid=3066 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { perfmon } for  pid=3066 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { perfmon } for  pid=3066 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { bpf } for  pid=3066 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { bpf } for  pid=3066 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit: BPF prog-id=125 op=LOAD
Dec 13 13:57:20.494000 audit[3066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3024 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:20.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936346638303438643662646164656363613935346365636636386365
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { bpf } for  pid=3066 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { bpf } for  pid=3066 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { perfmon } for  pid=3066 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { perfmon } for  pid=3066 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { perfmon } for  pid=3066 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { perfmon } for  pid=3066 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { perfmon } for  pid=3066 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { bpf } for  pid=3066 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { bpf } for  pid=3066 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit: BPF prog-id=126 op=LOAD
Dec 13 13:57:20.494000 audit[3066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3024 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:20.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936346638303438643662646164656363613935346365636636386365
Dec 13 13:57:20.494000 audit: BPF prog-id=126 op=UNLOAD
Dec 13 13:57:20.494000 audit: BPF prog-id=125 op=UNLOAD
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { bpf } for  pid=3066 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { bpf } for  pid=3066 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { bpf } for  pid=3066 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { perfmon } for  pid=3066 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { perfmon } for  pid=3066 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { perfmon } for  pid=3066 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { perfmon } for  pid=3066 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { perfmon } for  pid=3066 comm="runc" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { bpf } for  pid=3066 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit[3066]: AVC avc:  denied  { bpf } for  pid=3066 comm="runc" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Dec 13 13:57:20.494000 audit: BPF prog-id=127 op=LOAD
Dec 13 13:57:20.494000 audit[3066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3024 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null)
Dec 13 13:57:20.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936346638303438643662646164656363613935346365636636386365
Dec 13 13:57:20.512220 env[1206]: time="2024-12-13T13:57:20.512160842Z" level=info msg="StartContainer for \"964f8048d6bdadecca954cecf68ce5601a0eea1fe81cabc2bfcb8a555f63ee48\" returns successfully"
Dec 13 13:57:20.640965 kubelet[1452]: E1213 13:57:20.640908    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:21.214434 systemd-networkd[1035]: cali5ec59c6bf6e: Gained IPv6LL
Dec 13 13:57:21.310355 systemd[1]: run-containerd-runc-k8s.io-964f8048d6bdadecca954cecf68ce5601a0eea1fe81cabc2bfcb8a555f63ee48-runc.5wzO8K.mount: Deactivated successfully.
Dec 13 13:57:21.641251 kubelet[1452]: E1213 13:57:21.641186    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Dec 13 13:57:22.641866 kubelet[1452]: E1213 13:57:22.641811    1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"